Cybersecurity culture improves despite the dark clouds of the past year

Despite a hardening economic climate, heightened global tensions and the onset of new technology making cybercrime easier, 76% of the CISOs, suggested that no material breaches had occurred and... Read more »

Coalition ESS helps enterprises mitigate their most critical risks

Coalition announced the Coalition Exploit Scoring System (Coalition ESS), a vulnerability scoring system that helps risk managers mitigate potential cyber threats. Developed by Coalition Security Labs, the company’s research... Read more »

OneSpan Notary enhancements secure digital identities

OneSpan announced expanded features for OneSpan Notary, a next-generation, all-in-one, cloud-connected solution that enables organizations to transform the way notaries and customers complete agreements and notarize documents in a... Read more »

anecdotes Risk Manager updates provide users with data-powered risk management

anecdotes launched an updated version of its Risk Manager Application. Powered by data and automation, the Risk Manager delivers enterprise-level risk management insights and monitoring capabilities, enabling organizations to... Read more »

T-Mobile partners with Google Cloud to bring next generation 5G capabilities to life

T-Mobile and Google Cloud are working together to combine the power of 5G and edge compute, giving enterprises more ways to embrace digital transformation. T-Mobile will connect the 5G... Read more »

VMware fixes critical flaws in Aria Operations for Networks (CVE-2023-20887)

VMware has fixed two critical (CVE-2023-20887, CVE-2023-20888) and one important vulnerability (CVE-2023-20889) in Aria Operations for Networks (formerly vRealize Network Insight), its popular enterprise network monitoring tool. About the... Read more »

How secure is your vehicle with digital key technology?

Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the automotive industry. While there are a few different approaches... Read more »

How cybercriminals target energy companies

In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses how cybercriminals employ specialized strategies when targeting energy companies. This is primarily due... Read more »

Fiddler Auditor: Open-source tool evaluates the robustness of large language models

Fiddler Auditor is an open-source tool designed to evaluate the robustness of Large Language Models (LLMs) and Natural Language Processing (NLP) models. LLMs can sometimes produce unwarranted content, potentially... Read more »

Cyber debt levels reach tipping point

The tension between difficult economic conditions and the pace of technology innovation, including the evolution of AI, is influencing the growth of identity-led cybersecurity exposure, according to CyberArk. The... Read more »
Subscribe to our Newsletter