Top 12 vulnerabilities routinely exploited in 2022

Cybersecurity agencies from member countries of the Five Eyes intelligence alliance have released a list of the top 12 vulnerabilities routinely exploited in 2022, plus 30 additional ones also... Read more »

Cobalt Iron Compass Migrator automates data migration from legacy backup environments

Cobalt Iron released Compass Migrator, a new capability of the Cobalt Iron Compass enterprise SaaS backup platform. Large enterprises are using Compass Migrator to gain control of their backup... Read more »

Kinetic MDR protects business data from cyber threats

Kinetic Business has launched a new cybersecurity product, Managed Detection and Response (MDR), designed exclusively for business customers. The all-in-one security solution protects business data, network, applications, and users... Read more »

Deepfence ThreatStryker offers runtime protection and inline threat neutralization

Deepfence released ThreatStryker, an enterprise offering built on top of ThreatMapper. “Deepfence has changed the economic landscape of cloud security with our open source first strategy which insists that... Read more »

Google makes removal of personal user info from Search easier

Google is making it easier for users to remove personal contact information and personal, non-consensual explicit imagery from Google search results. “Of course, removing content from Google Search does... Read more »

Datadog Intelligent Test Runner helps organizations allocate their cloud expenses

Datadog introduces the Intelligent Test Runner, helping development teams save time, minimize failures and optimize costs. Traditional testing solutions run the entirety of a test suite against every code... Read more »

August 2023 Patch Tuesday forecast: Software security improvements

The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing the community to pay closer attention to early identification, as well as fast response, to vulnerabilities... Read more »

Multi-modal data protection with AI’s help

Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must deal with first order chaos and risk much like... Read more »

New infosec products of the week: August 4, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar, SpecterOps, Synopsys, Traceable AI, and Lineaje. Open-source penetration testing... Read more »

The direct impact of cyberattacks on patient safety and care delivery

As the healthcare industry continues its rapid transformation through the adoption of digital technologies, it is also confronted with an ever-expanding range of cybersecurity threats. In this Help Net... Read more »
Subscribe to our Newsletter