Semperis has expanded Forest Druid, its community-driven attack path management tool, to include support for Microsoft Entra ID (formerly Azure AD), saving time for cybersecurity teams in identifying and... Read more »
Check Point launched Quantum SASE, integrating technologies from newly acquired Perimeter 81. This integrated offering addresses organizations’ needs for a unified user experience, simplified SASE management, and a fast,... Read more »
The “contain user” feature select Microsoft Defender for Endpoint customers have been trying out since November 2022 is now available to a wider pool of organizations, Microsoft has announced.... Read more »
NetWitness has partnered with SDG to deliver comprehensive managed security services for effective threat detection and response capabilities, addressing cyber threats for even the most complex organizations. NetWitness offers... Read more »
Quantum announced new bundled offerings for organization-wide data protection based on Quantum DXi-Series Backup Appliances. With continued data growth, the increasing value of data, and the constant threat of... Read more »
Tidelift announced a broad new set of capabilities as part of the Tidelift Subscription that expand customers’ ability to utilize Tidelift’s maintainer-validated data to make more informed decisions about... Read more »
Permission Slip, an iPhone and Android app developed by Consumer Reports, helps users ask companies and data brokers to stop sharing their personal data and/or delete it. The Permission... Read more »
Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into completely unknown... Read more »
In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous penetration testing because yearly ones are not enough. They... Read more »
Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically, such as domain resolution and IP geolocation, saving you... Read more »
