In this Help Net Security video, Rodman Ramezanian, Cloud Threat Lead at Skyhigh Security, talks about what we can expect in 2023 security wise. Humans will continue to be... Read more »
Robotic Process Automation (RPA) promises numerous benefits to organizations investing in it, including increased worker productivity, the automation of tedious and monotonous tasks, and improved efficiency. According to Deloitte,... Read more »
Specops Software released a research analyzing the top passwords used in live attacks against Remote Desktop Protocol (RDP) ports. This analysis coincides with the latest addition of over 34... Read more »
Comet released Kangas, an open-source smart data exploration, analysis and model debugging tool for machine learning. Kangas, available on GitHub, helps users understand and debug their data in a... Read more »
Cyber threats continue to increase in volume and complexity with threat actors developing new ways to avoid detection — including highly evasive malware. To help organizations outpace these evolving... Read more »
SecureAuth announced its Arculix Universal Authentication Fabric to further strengthen the technology to enable organizations for passwordless continuous authentication. Arculix Universal Authentication Fabric is a technology framework that delivers... Read more »
Forcepoint announced Forcepoint Data Visibility powered by Getvisibility, which provides clear views of all unstructured data to reduce the risk of data loss, data breaches and non-compliance. The combination... Read more »
Okta has released Okta for US Military – a new IL4 identity environment built exclusively for the DoD and approved mission partners. Hosted on the .mil domain (okta.mil), it... Read more »
Datto introduced Datto EDR, tailored for today’s MSPs and small to midsize businesses (SMBs) to help detect threats that evade other defenses. Having the right cybersecurity tools in place... Read more »
Strata Identity announced no-code Orchestration Recipes for deploying end-to-end, automated customer use cases on the Maverics multi-cloud identity orchestration platform. Traditional “connectors” merely link two identity products on a... Read more »