Black Hat USA 2023 video walkthrough

Help Net Security is in Las Vegas this week for Black Hat USA 2023, and this video provides a closer look at the event. The exhibitors featured in this... Read more »

BigID Access Intelligence Remediation defends users against unauthorized exposure

BigID launched Access Intelligence Remediation, empowering organizations to find and fix access rights violations at scale within their Data Security Posture Management (DSPM) workflows. With this latest innovation, BigID... Read more »

CommScope SYSTIMAX Constellation allows enterprises to build and augment IP networks

CommScope launched SYSTIMAX Constellation edge-based platform for connecting and powering tomorrow’s hyperconnected enterprise. The system combines fault-managed power, hybrid power/data fiber and ceiling-based “Constellation Points” in a star topology... Read more »

How to handle API sprawl and the security threat it poses

The proliferation of APIs has marked them as prime targets for malicious attackers. With recent reports indicating that API vulnerabilities are costing businesses billions of dollars annually, it’s no... Read more »

New infosec products of the week: August 11, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, LastPass, NetSPI, Solvo, ThreatConnect, and Vicarius. NetSPI launches ML/AI Pentesting solution to... Read more »

Photos: Black Hat USA 2023

Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas. The conference featured over 100 selected Briefings, open-source tool demos in the Arsenal, a Business... Read more »

How digital content security stays resilient amid evolving threats

With threats evolving and multiplying, it’s essential to understand how technological advancements can serve as both a challenge and an opportunity to safeguard digital content. In this Help Net... Read more »

Threat intelligence’s key role in mitigating malware threats

Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat intelligence Threat actors... Read more »

How to accelerate and access DDoS protection services using GRE

As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 Gbps. UDP flood... Read more »

How executives’ personal devices threaten business security

Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to Agency. Yet, while... Read more »
Subscribe to our Newsletter