AttackIQ Ready! gives security teams a clear portrait of their security program performance

AttackIQ launched AttackIQ Ready!, a fully managed breach and attack simulation service that leverages years of advanced content and actionable reporting to improve organizations’ security posture and security program... Read more »

ReasonLabs Dark Web Monitoring identifies malicious online activity

ReasonLabs has launched a Dark Web Monitoring feature to its RAV Online Security solution, a web extension that provides real-time, 24/7 protection against a range of malicious online activity.... Read more »

Certa collaborates with ID-Pal to simplify third-party onboarding

Certa, has unveiled its official partnership with ID-Pal. Using a blend of biometric, document, and database checks, ID-Pal’s solution will enable Certa customers to verify the identity of third-party... Read more »

Cynerio and Sodexo join forces to address growing threats to medical IoT devices

Cynerio has formed a partnership with Sodexo to provide hospitals and healthcare systems with visibility into their IoMT footprint that allows for the immediate remediation of identified threats through... Read more »

IBM partners with Wasabi to power data insights across hybrid cloud environments

IBM and Wasabi Technologies are collaborating to drive data innovation across hybrid cloud environments. This collaboration aims to allow enterprises to run applications across any environment – on-premises, in... Read more »

Votiro raises $11.5 million to accelerate global expansion

Votiro has raised $11.5 million in a Series A funding round led by Harvest Lane Asset Management to accelerate its marketing and sales reach in North America. Votiro is... Read more »

Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)

Attackers are exploiting a critical vulnerability (CVE-2022-47986) in the IBM Aspera Faspex centralized file transfer solution to breach organizations. About CVE-2022-47986 IBM Aspera Faspex is used by organizations to... Read more »

3CX customers targeted via trojanized desktop app

Suspected state-sponsored threat actors have trojanized the official Windows desktop app of the widely used 3CX softphone solution, a number of cybersecurity companies began warning on Wednesday. What is... Read more »

The rise of biometrics and decentralized identity is a game-changer for identity verification

The journey towards digital transformation for organizations and governments has been fraught with difficulties, resulting in some users needing to catch up as more digital services are introduced. In... Read more »

Protect your entire business with the right authentication method

In this Help Net Security interview, Tomasz Kowalski, CEO at Secfense emphasizes the significance of multi-factor authentication in the corporate landscape, highlights the use of microauthorizations to improve the... Read more »
Subscribe to our Newsletter