Rise in ransomware drives IT leaders to implement data encryption

The number of UK organizations implementing data encryption as a core part of their cybersecurity strategy has continued to rise, with 32% introducing a policy to encrypt all corporate... Read more »

AWS Cloud WAN connects cloud and on-premises environments

Amazon Web Services released AWS Cloud WAN, a new managed wide area network (WAN) service that connects on-premises data centers, colocation facilities, branch offices, and cloud resources to simplify... Read more »

Who are the best fraud fighters?

Seasoned fraud expert PJ Rohall has recently become the new Head of Fraud Strategy & Education at SEON. In this Help Net Security interview, he talks about how he... Read more »

The weaponizing of smartphone location data on the battlefield

For soldiers on the battlefield, the act of turning on one’s smartphone has been described as the digital equivalent of lighting a cigarette, as doing so creates a signal... Read more »

The enemy of vulnerability management? Unrealistic expectations

Organizations vary by size, industry, level of maturity, but one thing that they all have in common is needing to know how to quickly remediate security vulnerabilities. As an... Read more »

Best practices for cyber resilience

Cyber resilience is a top priority for global organizations. Understanding threats plays a key role in building and maintaining a strong layered security approach, according to IDC. In this... Read more »

NETSCOUT launches AI solution to help customers block DDoS attacks

NETSCOUT SYSTEMS launched a new, innovative AI-based solution enabling its customers to automatically and instantaneously block a large proportion of DDoS attacks thus simplifying operations and minimizing risk to... Read more »

Security Compass SD Elements 2022.2 delivers developer-centric approach to software threat modeling

Security Compass released SD Elements 2022.2, offering new capabilities to help organizations deliver developer-centric software threat modeling. By simplifying and accelerating the creation of threat models, and driving standardization... Read more »

Flashpoint Automate accelerates repeatable security-related processes

Flashpoint released Flashpoint Automate, a low-code security automation platform that enables cyber threat intelligence (CTI), security operation center (SOC), fraud, vulnerability management, and physical security teams to build, implement,... Read more »

Deloitte Zero Trust Access protects sensitive enterprise data

To help organizations adopt zero trust more quickly and efficiently, Deloitte is launching a new managed service – Zero Trust Access— that offers a cloud-native approach to securing communications... Read more »
Subscribe to our Newsletter