New Relic empowers IT and engineering teams to focus on real application security problems

New Relic launched new capabilities for New Relic IAST (Interactive Application Security Testing), including proof-of-exploit reporting for application security testing. New Relic customers can now identify exploitable vulnerabilities with... Read more »

Trellix secures sensitive and proprietary information with new protections for macOS

Trellix announced new macOS Trellix Data Loss Prevention Endpoint Complete capabilities to better secure sensitive and proprietary information from accidental or intentional exposure. Global organizations can now protect against... Read more »

Regula 4205D updates help border control authorities fight identity document fraud

The International Organization for Migration reports that the migrant flow has been steadily rising, with the numbers swelling from 153 million in 1995 to 281 million in 2022. Concurrently,... Read more »

Stellar Cyber and Torq join forces to deliver automation-driven security operations platform

Stellar Cyber announced a technology partnership with Torq to help security teams dramatically improve their ability to combat advanced attacks. This partnership combines the power of Stellar Cyber Open... Read more »

Nozomi Networks raises $100 million to help secure critical infrastructure

Nozomi Networks announced a $100 million Series E funding round to help accelerate innovative cyber defenses and expand cost-efficient go-to-market expansion globally. This latest round includes investments from Mitsubishi... Read more »

Mirantis enhances Lens Desktop to improve Kubernetes operations

Mirantis announced significant updates to Lens Desktop that makes working with Kubernetes easier by simplifying operations, improving efficiency, and increasing productivity. Lens 2024 Early Access is now available to... Read more »

LastPass’ CIO vision for driving business strategy, innovation

Recently, LastPass appointed Asad Siddiqui as its CIO. He brings over two decades of experience leading startups and large technology organizations. It was the perfect time for Help Net... Read more »

BSAM: Open-source methodology for Bluetooth security assessment

Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON... Read more »

Keyloggers, spyware, and stealers dominate SMB malware detections

In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers subsequently use this... Read more »

Product showcase: How to track SaaS security best practices with Nudge Security

As technology adoption has shifted to be employee-led, IT and security teams are contending with an ever-expanding SaaS attack surface. At the same time, they are often spread thin,... Read more »
Subscribe to our Newsletter