Synopsys enhances Polaris Software Integrity Platform with fAST offerings

Synopsys has launched the Fast Application Security Testing (fAST) offerings that represent the latest capabilities and features of the Polaris Software Integrity Platform. Synopsys fAST Static and Synopsys fAST... Read more »

1Kosmos integrates with ForgeRock to add biometric passwordless authentication to apps

1Kosmos has unveiled the integration of 1Kosmos BlockID with ForgeRock Access Manager which enables customers to modernize the onboarding experience for users and implement identity-based passwordless authentication on all... Read more »

Cyber threats organizations should keep an eye on in 2023

In Malwarebytes’ most recent report on the current state of malware, the company has identified several high-profile cyber threats that organizations should be on the lookout for in 2023.... Read more »

Flood of malicious packages results in NPM registry DoS

Attackers are exploiting the good reputation and “openness” of the popular public JavaScript software registry NPM to deliver malware and scams, but are also simultaneously and inadvertently launching DoS... Read more »

Fortinet enhances Security Fabric with real-time response and automation capabilities

Fortinet has expanded the Fortinet Security Fabric with new and enhanced products and capabilities to enable advanced threat prevention and coordinated response for a self-defending ecosystem across networks, endpoints,... Read more »

How AI is transforming cybersecurity for better and worse

Many sectors view AI and machine learning with mixed emotions, but for the cybersecurity industry, they present a double-edged sword. On the one hand, AI provides powerful tools for... Read more »

Stop online counterfeiters dead in their tracks

During this Help Net Security interview, Nicole Hofmann, CEO at Sentryc, delves into the critical issue of counterfeiting and the detrimental impact it has on industries and brands. Hofmann... Read more »

The high cost of insecure authentication methods

Insecure authentication is a primary cause of cyber breaches, and that cumbersome login methods take an unacceptable toll on employees and business productivity, according to HYPR. Respondents indicate that... Read more »

Re-evaluating immature and ineffective insider risk management programs

Managing insider risk is becoming increasingly difficult. In fact, insider risk is emerging as one of the most challenging threats to detect, mitigate and manage, according to Code42. Although... Read more »

F5 protects digital services with AI-powered app and API security capabilities

F5 has unveiled new security capabilities to give customers comprehensive protection and control in managing apps and APIs across on-premises, cloud, and edge locations. Specifically, new machine learning enhancements... Read more »
Subscribe to our Newsletter