Video game publisher/digital distribution company Valve is forcing developers who publish games on its Steam platform to “validate” new builds with a confirmation code received via SMS. The Steam... Read more »
Whistic launched AI-powered Smart Response capability within their dual-sided TPRM platform. With an eye toward entirely eliminating the manual steps of security assessment questionnaires, Smart Response leverages existing documentation... Read more »
ManageEngine adds next-generation antivirus capability to its UEM, Endpoint Central, positioning it as an endpoint protection platform. In today’s cyber environment, NGAV is crucial to addressing the loopholes left... Read more »
NetWitness launches 12.3 update of its NetWitness Intelligent Threat Detection and Response Platform. The latest update offers enterprises more visibility into cyber threats than ever before with passive discovery,... Read more »
Cybeats and CodeSecure announced a technology partnership to help customers proactively monitor and remediate software supply chain security threats. According to industry sources, reused code is prevalent in virtually... Read more »
ClearFake, a recently documented threat leveraging compromised WordPress sites to push malicious fake browser updates, is likely operated by the threat group behind the SocGholish “malware delivery via fake... Read more »
Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move beyond finding risks to effectively mitigating risk. Making that... Read more »
In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report on board collaboration with the C-suite — particularly the... Read more »
The CISO role was partially shielded from the macroeconomic challenges of 2023, according to a new research from IANS and Artico Search. 20% of CISOs did not receive a... Read more »
88% of organizations experienced an average of 40 attacks in the past 12 months, according to a survey conducted by the Proofpoint and Ponemon Institute. Supply chain attacks: Leading... Read more »
