One of the biggest challenges faced by regulated and non-regulated companies is assessing whether or not another business is safe to work with. Existing approaches rely on manual research... Read more »
Splunk and Microsoft are partnering to build Splunk’s enterprise security and observability offerings on Microsoft Azure. Additionally, for the first time, Splunk solutions will be available for purchase on... Read more »
Red Siege has developed and made available many open-source tools to help with your penetration testing work. The company plans to continue to support the tools listed below, whether... Read more »
Consumer expectations will reshape the needs and economics of the internet, according to Cisco. People in EMEA are rethinking what they rely on the internet for, balancing classic demands... Read more »
In an era where cyber threats continue to evolve, healthcare organizations are increasingly targeted by malicious actors employing multiple attack vectors, according to Trustwave. In its new research, Trustwave... Read more »
The number of data compromises reported in the U.S. in the H1 of 2023 is higher than the total compromises reported every year between 2005 and 2020, except for... Read more »
Anviz launched IntelliSight, its latest video surveillance offering that harnesses the power of distributed cloud and 4G technology to create an all-in-one security solution that delivers versatility, security, and... Read more »
A critical cross site scripting (XSS) vulnerability (CVE-2023-34192) in popular open source email collaboration suite Zimbra is being exploited by attackers. About the vulnerability (CVE-2023-34192) CVE-2023-34192 could allow a... Read more »
The furry in which the automotive community pried, prodded, and eventually outsmarted existing functions that are software-driven is nothing short of horrifying. While it seemed like automotive cybersecurity would... Read more »
In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust principles, identity access management,... Read more »