New infosec products of the week: March 31, 2023

Here’s a look at the most interesting products from the past week, featuring releases from BreachLock, HackNotice, LOKKER, Nile, and Tausight. HackNotice Actions helps people to understand the extent... Read more »

Overcoming obstacles to introduce zero-trust security in established systems

In this Help Net Security interview, Michal Cizek, CEO at GoodAccess, discusses the crucial balance between leveraging distributed resources and maintaining top-notch security measures. With the growing remote work... Read more »

The foundation of a holistic identity security strategy

Only 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud environments, according to CyberArk. A critical path for cyber... Read more »

Leveraging network automation to enhance network security

Data backups get a lot of attention, but sadly, sometimes, the operational work that keeps networks secure – like device backups, upgrades, and configuration grooming – goes undone. Recent... Read more »

Cloud diversification brings complex data management challenges

As IT infrastructure becomes more diverse, organizations face the challenge of integrating data management and control, according to Nutanix. The research showed that the majority of IT teams leverage... Read more »

OSC&R open software supply chain attack framework now on GitHub

OSC&R (Open Software Supply Chain Attack Reference) is an open framework for understanding and evaluating software supply chain security threats. It has received the endorsement of former U.S. NSA... Read more »

Intruder unveils API scanning to help organizations reduce exposure

Intruder updates its cloud-based vulnerability management service, allowing organisations of all sizes to secure their APIs by automatically detecting vulnerabilities, gaps, security weaknesses, and misconfigurations that hackers can exploit.... Read more »

AttackIQ Ready! gives security teams a clear portrait of their security program performance

AttackIQ launched AttackIQ Ready!, a fully managed breach and attack simulation service that leverages years of advanced content and actionable reporting to improve organizations’ security posture and security program... Read more »

ReasonLabs Dark Web Monitoring identifies malicious online activity

ReasonLabs has launched a Dark Web Monitoring feature to its RAV Online Security solution, a web extension that provides real-time, 24/7 protection against a range of malicious online activity.... Read more »

Certa collaborates with ID-Pal to simplify third-party onboarding

Certa, has unveiled its official partnership with ID-Pal. Using a blend of biometric, document, and database checks, ID-Pal’s solution will enable Certa customers to verify the identity of third-party... Read more »
Subscribe to our Newsletter