Category: HelpnetSecurity

Tech leaders struggle to keep up with AI advances
09
Nov
2023

Tech leaders struggle to keep up with AI advances

New data reveals artificial intelligence is challenging organizations in significant ways, with only 15% of global tech leaders reporting they…

Product showcase: Red Piranha's security first, single vendor SASE, collaboration with Intel
09
Nov
2023

Product showcase: Red Piranha’s security first, single vendor SASE, collaboration with Intel

Red Piranha has released the latest Crystal Eye consolidated security platform officially in global collaboration with Intel on the 12th…

Most cybersecurity investments aren't used to their full advantage
09
Nov
2023

Most cybersecurity investments aren’t used to their full advantage

While organizations are slashing budgets across other departments, IT and security budgets are growing to address evolving IT infrastructure and…

Microsoft Authenticator suppresses suspicious MFA notifications
08
Nov
2023

Microsoft Authenticator suppresses suspicious MFA notifications

Microsoft has quietly rolled out a new mechanism that shields users of its mobile Authenticator app from suspicious (and annoying)…

Druva introduces Azure VM backup and recovery capabilities
08
Nov
2023

Druva introduces Azure VM backup and recovery capabilities

Druva announced cloud-native protection for Azure backups, enabling customers to leverage the simplicity and value of SaaS across their cloud…

Download: The Ultimate Guide to the CISSP
08
Nov
2023

Download: The Ultimate Guide to the CISSP

The The Ultimate Guide to the CISSP covers everything you need to know about the world’s premier cybersecurity leadership certification….

Marina Bay Sands breach exposed data of 665,000 customers
08
Nov
2023

Marina Bay Sands breach exposed data of 665,000 customers

Singapore-based luxury resort and casino Marina Bay Sands has suffered a data breach that exposed data of 665,000 non-casino rewards…

The 3 key stages of ransomware attacks and useful indicators of compromise
08
Nov
2023

The 3 key stages of ransomware attacks and useful indicators of compromise

For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security…

Aqua Trivy open-source security scanner now finds Kubernetes security risks
08
Nov
2023

Aqua Trivy open-source security scanner now finds Kubernetes security risks

The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now,…

Companies have good reasons to be concerned about generative AI
08
Nov
2023

Companies have good reasons to be concerned about generative AI

Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks…

Uphold Linux systems' performance and availability in Azure
08
Nov
2023

Uphold Linux systems’ performance and availability in Azure

Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your…

Varonis enhances its Microsoft 365 offering to prevent sensitive email exposure
07
Nov
2023

Varonis enhances its Microsoft 365 offering to prevent sensitive email exposure

Varonis announced major enhancements to its Microsoft 365 offering, adding more robust capabilities to continuously detect and prevent exposures in…