7 free cyber threat maps showing attack intensity and frequency

Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations provide a global perspective on digital threats, showcasing the... Read more »

Kubescape 3.0 elevates open-source Kubernetes security

Targeted at the DevSecOps practitioner or platform engineer, Kubescape, the open-source Kubernetes security platform has reached version 3.0. Vulnerability scan results Kubescape 3.0 features Kubescape 3.0 adds new features... Read more »

How AI is transforming consumer privacy expectations

Consumers are concerned about their privacy with AI. Cisco discovered that 60% had lost trust in organizations due to their AI use. In this Help Net Security video, Robert... Read more »

Microsegmentation proves its worth in ransomware defense

The number of ransomware attacks (successful and unsuccessful) has doubled over the past two years, from 43 on average in 2021 to 86 in 2023, according to Akamai. Security... Read more »

Outdated cryptographic protocols put vast amounts of network traffic at risk

Cryptography is largely taken for granted – rarely evaluated or checked – a practice that could have devastating consequences for businesses as attack surfaces continue to expand, the cost... Read more »

eBook: Keeping Active Directory out of hackers’ cross-hairs

Active Directory is a prime target for threat actors, and companies must act now to eliminate it as a threat vector permanently. Read the e-book to review: Active Directory... Read more »

Beyond Identity launches Okta Defense Kit to identify and prevent security vulnerabilities

Beyond Identity released the Okta Defense Kit, a duo of two preventative tools to help security and identity professionals identify and prevent security vulnerabilities, including those that contributed to... Read more »

Palo Alto Networks to acquire Talon Cyber Security

Palo Alto Networks has entered into a definitive agreement to acquire Talon Cyber Security, a pioneer of Enterprise Browser technology. Talon’s Enterprise Browser provides a solution that, combined with... Read more »

MITRE partners with Microsoft to address generative AI security risks

MITRE and Microsoft have added a data-driven generative AI focus to MITRE ATLAS, a community knowledge base that security professionals, AI developers, and AI operators can use as they... Read more »

Red Hat Device Edge ensures consistency across edge and hybrid cloud deployments

Red Hat has introduced Red Hat Device Edge, which offers a consistent platform designed for resource-constrained environments that necessitate small form-factor computing at the device edge. This includes Internet... Read more »
Subscribe to our Newsletter