NetApp cyber-resiliency capabilities protect both primary and secondary data

NetApp announced cyber-resiliency capabilities that will equip customers to better protect and recover their data in the face of ransomware threats. NetApp integrates artificial intelligence (AI) and machine learning... Read more »

Okta FGA enables developers to define authorization in a way that best fits their business

Okta announced Fine Grained Authorization (FGA) to address authorization complexities for developers. FGA allows developers to design authorization models in a way that’s centralized, flexible, scalable, and easy to... Read more »

Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes

A threat actor specializing in establishing initial access to target organizations’ computer systems and networks is using booby-trapped email attachments to steal employees’ NTLM hashes. Why are they after... Read more »

Why cyber maturity assessment should become standard practice

Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help determine... Read more »

3 free data protection regulation courses you can take right now

Increasingly, information about us, and even by us, is being processed. Even mundane or insignificant details can be combined and linked with other data in a manner that may... Read more »

Secure your hybrid workforce: The advantages of encrypted storage

In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid workforces. He talks about... Read more »

What organizations need to know about the Digital Operational Resilience Act (DORA)

In this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the Digital Operational Resilience Act (DORA) on organizations across the... Read more »

Organizations are knowingly releasing vulnerable applications

92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties... Read more »

Critical vulnerabilities in TeamCity JetBrains fixed, release of technical details imminent, patch quickly! (CVE-2024-27198, CVE-2024-27199)

JetBrains has fixed two critical security vulnerabilities (CVE-2024-27198, CVE-2024-27199) affecting TeamCity On-Premises and is urging customers to patch them immediately. “Rapid7 originally identified and reported these vulnerabilities to us... Read more »

Cloudflare Defensive AI protects organizations against AI-enhanced attacks

Cloudflare announced Defensive AI, a personalized approach to securing organizations against the new wave of risks presented by emerging technology. Threat actors have begun to successfully test the limits... Read more »
Subscribe to our Newsletter