Millions still exposed despite available fixes

Although KEV catalog vulnerabilities are frequent targets of APT Groups, a large and exploitable attack surface remains due to software vendors’ lack of awareness and action, according to Rezilion.... Read more »

Managing the risks of unstructured data growth

Locating and identifying sensitive data, including defense-in-depth strategies where a series of mechanisms are layered to protect valuable information, should be a critical component of any cloud data security... Read more »

Infosec products of the month: March 2023

Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Appdome, Atakama, BreachLock, Elevate Security, Fastly, Forescout, ForgeRock, GrammaTech, HackNotice, Hornetsecurity, HYPR, Kensington,... Read more »

Week in review: 3CX supply chain attack, ChatGPT data leak

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Visa fraud expert outlines the many faces of payment ecosystem fraud In this Help... Read more »

CloudBees integrates with Argo to enhance cloud-native software delivery

CloudBees has unveiled the integration of CloudBees’ continuous delivery and release orchestration solution, CloudBees CD/RO, with Argo Rollouts. The integration will enhance customers’ ability to deliver software faster, with... Read more »

Socura releases Managed SASE service to secure the hybrid workforce

Socura has launched its Managed SASE (Secure Access Service Edge) service in partnership with Palo Alto Networks‘ Prisma. Market industry researchers expect SASE to be a $60bn industry by... Read more »

Zenoss introduces monitoring capabilities for Kubernetes

Zenoss has launched a free trial for monitoring Kubernetes, the de facto standard platform for running containers in production at scale, including in on-prem and cloud environments. This real-time... Read more »

New infosec products of the week: March 31, 2023

Here’s a look at the most interesting products from the past week, featuring releases from BreachLock, HackNotice, LOKKER, Nile, and Tausight. HackNotice Actions helps people to understand the extent... Read more »

Overcoming obstacles to introduce zero-trust security in established systems

In this Help Net Security interview, Michal Cizek, CEO at GoodAccess, discusses the crucial balance between leveraging distributed resources and maintaining top-notch security measures. With the growing remote work... Read more »

The foundation of a holistic identity security strategy

Only 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud environments, according to CyberArk. A critical path for cyber... Read more »
Subscribe to our Newsletter