Semperis enhances Forest Druid to guard against Microsoft Entra ID attacks

Semperis has expanded Forest Druid, its community-driven attack path management tool, to include support for Microsoft Entra ID (formerly Azure AD), saving time for cybersecurity teams in identifying and... Read more »

Check Point Quantum SASE protects hybrid work and cloud networks

Check Point launched Quantum SASE, integrating technologies from newly acquired Perimeter 81. This integrated offering addresses organizations’ needs for a unified user experience, simplified SASE management, and a fast,... Read more »

Microsoft Defender can automatically contain compromised user accounts

The “contain user” feature select Microsoft Defender for Endpoint customers have been trying out since November 2022 is now available to a wider pool of organizations, Microsoft has announced.... Read more »

NetWitness partners with SDG for comprehensive threat detection and response services

NetWitness has partnered with SDG to deliver comprehensive managed security services for effective threat detection and response capabilities, addressing cyber threats for even the most complex organizations. NetWitness offers... Read more »

Quantum unveils DXi Edge-Core-Cloud Bundles for data protection and ransomware recovery

Quantum announced new bundled offerings for organization-wide data protection based on Quantum DXi-Series Backup Appliances. With continued data growth, the increasing value of data, and the constant threat of... Read more »

Tidelift improves software supply chain security with open source intelligence capabilities

Tidelift announced a broad new set of capabilities as part of the Tidelift Subscription that expand customers’ ability to utilize Tidelift’s maintainer-validated data to make more informed decisions about... Read more »

Sic Permission Slip on data brokers that use your data

Permission Slip, an iPhone and Android app developed by Consumer Reports, helps users ask companies and data brokers to stop sharing their personal data and/or delete it. The Permission... Read more »

Keeping up with the demands of the cyber insurance market

Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into completely unknown... Read more »

Unmasking the limitations of yearly penetration tests

In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous penetration testing because yearly ones are not enough. They... Read more »

Yeti: Open, distributed, threat intelligence repository

Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically, such as domain resolution and IP geolocation, saving you... Read more »
Subscribe to our Newsletter