HackNotice Actions helps people to understand the extent of their data exposure

HackNotice is offering additional tailored protection via its new service, HackNotice Actions. Further empowering employees, HackNotice Actions reaches out to any company where a person’s PII or other data... Read more »

Endace collaborates with Niagara Networks to accelerate response to network threats

Endace and Niagara Networks announced a partnership that combines Endace’s scalable, always-on packet capture with Niagara Networks’ complete visibility solutions. The combination of the two technologies gives NetOps and... Read more »

Signifyd and Adobe partner to eliminate the risk of payments fraud

Signifyd has achieved Platinum Partner status in the Adobe Technology Partner Program for Experience Cloud, making it fraud protection solution in the tier to offer complete and guaranteed chargeback... Read more »

Exchange Online will soon start blocking emails from old, vulnerable on-prem servers

Slowly but surely, Microsoft aims to make it impossible for unsupported and/or unpatched on-prem Microsoft Exchange servers to use the company’s Exchange Online hosted cloud service to deliver email.... Read more »

Apple backports fix for exploited WebKit bug to older iPhones, iPads (CVE-2023-23529)

Apple has released security updates for – pardon the pop-culture reference – everyhing everywhere all at once, and has fixed the WebKit vulnerability (CVE-2023-23529) exploited in the wild for... Read more »

Europol details ChatGPT’s potential for criminal abuse

With the increased public interest in ChatGPT, the Europol Innovation Lab took the matter seriously and conducted a series of workshops involving subject matter experts from various departments of... Read more »

What you need before the next vulnerability hits

Cyberattacks tend to come from two angles: criminals take advantage of employees with privileged access or of security weaknesses in your hardware/software infrastructure. These broad categories encompass attack vectors... Read more »

Running a security program before your first security hire

In this Help Net Security video, Matt Spitz, Head of Engineering at Vanta, talks about pragmatic security and illustrates what a small company with limited resources needs to do... Read more »

What the food and building industry can teach us about securing embedded systems

As one of the leading experts in product security with over 15 years of experience in security engineering and 120 cybersecurity patents under his belt, Adam Boulton is one... Read more »

Balancing security risks and innovation potential of shadow IT teams

Shadow IT teams, also known as rogue IT teams, have grown in popularity in recent years due to the rise of cloud-based apps and remote work. However, this has... Read more »
Subscribe to our Newsletter