In this exclusive Help Net Security interview, we delve into the world of cybersecurity with Michael Adams, the CISO at Zoom. Adams analyzes how organizations grapple with the effects... Read more »
Government organizations are attractive targets for threat actors whose motivations may be geopolitical, financial, or disruption, according to BlackBerry. Because threat actors may include private individuals, small groups, or... Read more »
Ransomware remains a lucrative tool for cybercriminals as attackers continue to target a wide array of businesses. In response to this growing threat, an increasing number of organizations are... Read more »
The software supply chain encompasses the entire lifecycle of a software product, from its conception and development to its distribution and deployment. It involves a complex network of suppliers,... Read more »
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Open-source penetration testing tool BloodHound CE released SpecterOps released version 5.0 of BloodHound Community... Read more »
Datadog announced Security Inbox, a new capability for engineers to prioritize and remediate the most important security issues impacting their production applications. Traditional security products specialize in identifying massive... Read more »
Cybersecurity agencies from member countries of the Five Eyes intelligence alliance have released a list of the top 12 vulnerabilities routinely exploited in 2022, plus 30 additional ones also... Read more »
Cobalt Iron released Compass Migrator, a new capability of the Cobalt Iron Compass enterprise SaaS backup platform. Large enterprises are using Compass Migrator to gain control of their backup... Read more »
Kinetic Business has launched a new cybersecurity product, Managed Detection and Response (MDR), designed exclusively for business customers. The all-in-one security solution protects business data, network, applications, and users... Read more »
Deepfence released ThreatStryker, an enterprise offering built on top of ThreatMapper. “Deepfence has changed the economic landscape of cloud security with our open source first strategy which insists that... Read more »
