Category: HelpnetSecurity

Keysight AI Insight Brokers accelerates threat detection and response
19
Mar
2025

Keysight AI Insight Brokers accelerates threat detection and response

Keysight Technologies announces the expansion of its Keysight Vision Network Packet Brokers (NPBs), with the introduction of AI Insight Brokers….

Cytex AICenturion protects against data exfiltration
19
Mar
2025

Cytex AICenturion protects against data exfiltration

Cytex launched AICenturion, a LLM Firewall with Data Loss Prevention (DLP) capabilities. GenAI’s risks intensify as LLMs prevent enterprises from…

Cloudforce One threat events platform provides a real-time view of threat activity
19
Mar
2025

Cloudforce One threat events platform provides a real-time view of threat activity

Cloudflare launched the Cloudforce One threat events platform to provide real-time intelligence on cyberattacks occurring across the Internet. Based on…

TXOne Networks Stellar 3.2 helps organizations make informed security choices
19
Mar
2025

TXOne Networks Stellar 3.2 helps organizations make informed security choices

TXOne Networks announced Version 3.2 of its Stellar solution, further enhancing its capabilities from endpoint protection to more comprehensive detection…

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK
19
Mar
2025

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access…

Moving beyond checkbox security for true resilience
19
Mar
2025

Moving beyond checkbox security for true resilience

In this Help Net Security interview, William Booth, director, ATT&CK Evaluations at MITRE, discusses how CISOs can integrate regulatory compliance…

Dependency-Check: Open-source Software Composition Analysis (SCA) tool
19
Mar
2025

Dependency-Check: Open-source Software Composition Analysis (SCA) tool

Dependency-Check is an open-source Software Composition Analysis (SCA) tool to identify publicly disclosed vulnerabilities within a project’s dependencies. The tool…

How AI and automation are reshaping security leadership
18
Mar
2025

How AI and automation are reshaping security leadership

The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous…

Google to acquire Wiz for $32 billion
18
Mar
2025

Google to acquire Wiz for $32 billion

Google announced it has signed a definitive agreement to acquire Wiz for $32 billion, subject to closing adjustments, in an…

How financial institutions can minimize their attack surface
18
Mar
2025

How financial institutions can minimize their attack surface

In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He…

Hackers target AI and crypto as software supply chain risks grow
18
Mar
2025

Hackers target AI and crypto as software supply chain risks grow

The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along…

Cybersecurity jobs available right now: March 18, 2025
18
Mar
2025

Cybersecurity jobs available right now: March 18, 2025

Application Security Expert monday.com | United Kingdom | Hybrid – View job details As an Application Security Expert, you will…