Fighting insider threats is tricky but essential work

Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats (75%). But which of the two is a bigger... Read more »

Automated Emulation: Open-source breach and attack simulation lab

Automated Emulation is an open-source Terraform template designed to create a customizable, automated breach and attack simulation lab. The solution automatically constructs the following resources hosted on AWS: One... Read more »

CISOs’ role in identifying tech components and managing supply chains

In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains and achieving comprehensive... Read more »

In 2024, AI and ML shift from flashy to functional

AI and ML deserve the hype they get, but the focus can’t always be on the glitz. As these advances to deliver real benefits, there’s a slew of more... Read more »

45% of critical CVEs left unpatched in 2023

Global attack attempts more than doubled in 2023, increasing 104%, according to Armis. Blind spots and critical vulnerabilities are worsening, with 45% of critical CVEs remaining unpatched. Utilities (over... Read more »

Venafi Stop Unauthorized Code Solution reduces attack surface

Venafi introduced its new Stop Unauthorized Code Solution, designed to help security teams proactively prevent unauthorized code across any operating environment. By leveraging the combined power of Venafi’s CodeSign... Read more »

Stack Identity expands its plaform with ITDR to tackle shadow access and shadow identities

Stack Identity has unveiled the expansion of the Identity Access Risk Management Platform with identity threat detection and response (ITDR) to tackle shadow access and shadow identities. Identity-centric attacks... Read more »

Enzoic and ThreatQuotient join forces to defend companies from compromised credentials

Enzoic announced a partnership with ThreatQuotient, an innovative security operations platform provider. Through the agreement, the latter is integrating Enzoic’s Dark Web monitoring capabilities to scan for exposure and... Read more »

PoC exploit for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)

Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears that attackers may soon take advantage of it. Fortra’s... Read more »

VIVOTEK VORTEX Connect empowers enterprise cloud transition

VIVOTEK introduces its cloud-based security service VORTEX, emphasizing a smarter and easier approach. Now featuring the latest addition – VORTEX Connect, this new feature is integrated into VIVOTEK’s latest... Read more »
Subscribe to our Newsletter