The hidden dangers of low-value data

In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as... Read more »

Regulatory activity forces compliance leaders to spend more on GRC tools

Legal and compliance department investment in GRC (governance, risk, and compliance) tools will increase 50% by 2026, according to Gartner. Assurance leaders are seeking out technology solutions to help... Read more »

Critical business app outages cost $500,000 per hour of downtime

Observability’s adoption is on the rise and full-stack observability leads to better service-level metrics, such as fewer, shorter outages and lower outage costs, according to New Relic. Respondents receive... Read more »

When data falls into the wrong hands

A data breach involves unauthorized access to sensitive, protected, or confidential information, often resulting in data theft, exposure, or alteration. The methods employed by cybercriminals to perpetrate these breaches... Read more »

PostgreSQL 16: Where enhanced security meets high performance

PostgreSQL is an open-source object-relational database platform with a track record of over 25 years of ongoing development. Its reputation is solid for its reliability, extensive features, and high... Read more »

Week in review: 17 free AWS cybersecurity courses, exploited Chrome zero-day

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The blueprint for a highly effective EASM solution In this Help Net Security interview,... Read more »

Concordium Web3 ID prioritizes user privacy for both individuals and businesses

Concordium unveils Web3 ID: an edge identification platform offering age-verification capacities designed to prioritize user privacy for both individuals and businesses. Concordium’s age verification tooling works to protect minors... Read more »

Modernizing fraud prevention with machine learning

The number of digital transactions has skyrocketed. As consumers continue to spend and interact online, they have growing expectations for security and identity verification. As fraudsters become savvier and... Read more »

New infosec products of the week: September 15, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Armis, Cisco, CTERA, Kingston Digital, Purism, and Swissbit. Librem 11 tablet sets new standard... Read more »

Enterprises persist with outdated authentication strategies

Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber... Read more »
Subscribe to our Newsletter