Accenture and Workday help companies reinvent their finance functions

Accenture and Workday are expanding their partnership to help organizations reinvent their finance functions to be more agile, data-driven and customer-centric. The companies are collaborating to develop a suite... Read more »

AUCloud selects SentinelOne for government and business security

AUCloud has deployed SentinelOne’s Singularity Platform to keep its business operations and the critical digital infrastructure it supplies to some of the nation’s most trusted government agencies and enterprises... Read more »

Tenable to acquire Ermetic for $240 million

Tenable Holdings has signed a definitive agreement to acquire Ermetic. Tenable intends to integrate Ermetic’s capabilities into its Tenable One Exposure Management Platform to deliver contextual risk visibility, prioritization... Read more »

MacOS malware has a new trick up its sleeve

A newer version of the Atomic Stealer macOS malware has a new trick that allows it to bypass the operating system’s Gatekeeper, Malwarebytes researchers have discovered. Mac malware delivered... Read more »

Pynt introduces API security platform and raises $6 million

Pynt released its autopilot platform for API security used by developers and security experts, as well as $6 million in Seed funding led by Joule Ventures with the participation... Read more »

SafeBase acquires Stacksi to automate responses to security questionnaires

SafeBase announced that it is acquiring Stacksi, the A.I.-powered security questionnaire automation platform. The acquisition advances the two companies’ shared vision to eliminate the time-consuming, cumbersome task of responding... Read more »

LibreOffice: Stability, security, and continued development

LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an active community of developers working on improving it,... Read more »

3 ways to strike the right balance with generative AI

To find the sweet spot where innovation doesn’t mean sacrificing your security posture, organizations should consider the following three best practices when leveraging AI. Implement role-based access control In... Read more »

How cybercriminals use look-alike domains to impersonate brands

Cybercriminals create hundreds of thousands of counterfeit domains that mimic well-known brands for financial gain. These fake domains serve multiple malicious purposes, such as sending phishing emails, hosting fraudulent... Read more »

Shifting left and right, innovating product security

In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, fostering collaboration across business units and product... Read more »
Subscribe to our Newsletter