Exabeam launches Outcomes Navigator to help organizations detect security threats

Exabeam has announced the general availability of Outcomes Navigator, an advanced visualization feature within the New-Scale SIEM product portfolio. Outcomes Navigator helps cybersecurity leaders overcome one of their most... Read more »

Habu announces AWS Clean Rooms solution for democratized data collaboration

Habu has joined the Amazon Web Services (AWS) Partner Network (APN) and has launched a new solution to integrate its Data Clean Room offering with AWS Clean Rooms, and... Read more »

Island integrates DLP capabilities for ChatGPT, Bard, and other AI

Island announced an enterprise-grade set of Data Loss Prevention (DLP) capabilities for all popular interactive AI-type applications including ChatGPT, Bard and others, within its Enterprise Browser. These features are... Read more »

VMware Aria Operations for Networks vulnerability exploited in the wild (CVE-2023-20887)

CVE-2023-20887, a pre-authentication command injection vulnerability in VMware Aria Operations for Networks (formerly vRealize Network Insight), has been spotted being exploited in the wild. There are no workarounds to... Read more »

Infosecurity Europe 2023 video walkthrough

Infosecurity Europe 2023 is taking place in London this week, and this video provides a closer look at this year’s event. The post Infosecurity Europe 2023 video walkthrough appeared... Read more »

Photos: Infosecurity Europe 2023, part 2

Infosecurity Europe is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. The first gallery is available here. Here’s a closer look... Read more »

Compromised ChatGPT accounts garner rapid dark web popularity

Compromised credentials were found within the logs of info-stealing malware traded on illicit dark web marketplaces over the past year, according to Group-IB. The number of available logs containing... Read more »

How to create SBOMs for container images

The importance of software bills of materials (SBOMs) has grown substantially in recent years as organizations recognize the need for greater transparency in the software supply chain. This focus... Read more »

US and European IT decision-makers have different cloud security priorities

The growing adoption of cloud has elevated cloud security fear for IT teams, as they grapple with the challenges and concerns arising from the widespread use of complex cloud... Read more »

The limitations of shifting left in application security

In this Help Net Security video, Jacob Garrison, Security Research for Bionic, explains the limitations of shifting left in application security. Key factors hindering the effectiveness of shifting left:... Read more »
Subscribe to our Newsletter