Privitar acquires Kormoon to extend its data privacy and provisioning capabilities

Privitar announced it has acquired Kormoon, a software platform that helps organizations manage the complexities of data privacy regulations by analyzing data usage, assessing risk, and automating compliance. Kormoon’s... Read more »

Michael Aiello joins Secureworks as CTO

Secureworks announced that it has appointed Michael Aiello as its new Chief Technology Officer (CTO). Aiello will play a pivotal role in setting the company’s long-term strategic vision to... Read more »

Microsoft fixes exploited zero-day in Windows CSRSS (CVE-2022-22047)

The July 2022 Patch Tuesday is upon us and has brought fixes for 84 CVEs in various Microsoft products, including an actively exploited zero-day: CVE-2022-22047, an elevation of privilege... Read more »

Concentric Eclipse helps individuals and teams mitigate digital risks

Concentric launched Eclipse, their new digital solution providing enhanced personal cybersecurity and digital privacy. Eclipse is a turnkey solution for individuals, families, and teams to help mitigate digital risks.... Read more »

Researchers defeat facial recognition systems with universal face mask

Can attackers create a face mask that would defeat modern facial recognition (FR) systems? A group of researchers from from Ben-Gurion University of the Negev and Tel Aviv University... Read more »

Employees frustrated by the lack of suitable tech in a hybrid work environment

Ivanti worked with global digital transformation experts and surveyed 10,000 office workers, IT professionals, and the C-Suite to evaluate the level of prioritization and adoption of DEX in organizations... Read more »

Are your site’s tracking technologies breaking the law?

Two irresistible yet conflicting forces are creating a real risk for businesses that operate on the web, which is every business that exists in 2022. Those forces are tracking... Read more »

How to develop successful incident response plans

In this Help Net Security video, Neal Bridges, CISO at Query.ai, talks about the rules organizations need to think about if they way to develop successful incident response (IR)... Read more »

A look at the bring your own browser (BYOB) approach

Recently, Microsoft retired IE 11 in favor of Microsoft Edge, which claims to be more secure than Google Chrome, with built-in defenses against phishing and malware. Does this mean... Read more »

Product showcase: ImmuniWeb Neuron, DAST with a zero false positives SLA

Few organizations can afford regular penetration testing of their numerous web applications, APIs and microservices. Instead, they usually leverage a fully automated web vulnerability scanning, namely various Dynamic Application... Read more »
Subscribe to our Newsletter