PCI Pal and Zoom join forces to secure payment process for customers

PCI Pal has joined forces with Zoom Video Communications to deliver an improved customer experience through the integration of PCI Pal Agent Assist and Digital Payments solutions into Zoom... Read more »

Qohash unveils remediation features for enhanced data security

Qohash introduces data remediation features to bolster organizations’ security and risk management. With this addition, the Qostodian platform now offers end-to-end security workflows, encompassing data discovery, monitoring, and remediation,... Read more »

Network Perception integrates technology with Claroty to boost OT cybersecurity for organizations

Network Perception announced a technology integration with Claroty to provide OT network auditors with a comprehensive, independent audit platform to track and verify system changes and enhance network visibility.... Read more »

Elliptic Labs releases AI Virtual Seamless Sensor

Elliptic Labs has launched its latest product, the AI Virtual Seamless Sensor. Elliptic Labs’ AI Virtual Seamless Sensor enables cross-device user experiences across different operating systems and chipset platforms,... Read more »

Resecurity integrates with Palo Alto Networks Cortex XSOAR Marketplace

Resecurity announced its integration with the Palo Alto Networks Cortex XSOAR Marketplace, a platform for security orchestration, automation, and response (SOAR). This integration allows Resecurity to offer three of... Read more »

Cyber risk is business risk: Qualys Enterprise TruRisk Platform sets new industry standard

In this Help Net Security interview, Sumedh Thakar, President and CEO of Qualys explores the vision behind the Qualys Enterprise TruRisk Platform, a strategic move aimed at redefining how... Read more »

Success eludes the International Counter Ransomware Initiative

A swing and a miss by the 50 member countries of the International Counter Ransomware Initiative (CRI), headlined by the US, who have confirmed a commitment to collectively address... Read more »

The real cost of healthcare cybersecurity breaches

With each step towards digitalization, from cloud computing to electronic records, the healthcare sector faces mounting risks that threaten not just the privacy but the very wellbeing of patients.... Read more »

CISOs vs. developers: A battle over security priorities

A majority of both developers and CISOs view software supply chain security as a top priority in their roles (70% and 52% respectively), according to Chainguard. However, there is... Read more »

Infostealers and the high value of stolen data

The risk of personal and professional data being stolen by nefarious actors looms larger than ever, according to Trend Micro. Understanding the risks associated with data theft, which include... Read more »
Subscribe to our Newsletter