Category: HelpnetSecurity

Organizations face an uphill battle to keep their sensitive data secure
14
Apr
2023

Organizations face an uphill battle to keep their sensitive data secure

On average, organizations store 61% of their sensitive data in the cloud, and most have experienced at least one cybersecurity…

Conquering modern data stack complexities
14
Apr
2023

Conquering modern data stack complexities

How are data teams conquering the complexity of the modern data stack? Unravel Data has asked 350+ data scientists, engineers,…

Google delivers secure open source software packages
13
Apr
2023

Google delivers secure open source software packages

Google has announced the Google Cloud Assured Open Source Software (Assured OSS) service, which aims to be a trusted source…

LinkedIn now allows you to verify your workplace
13
Apr
2023

LinkedIn now allows you to verify your workplace

To combat the surge of fake LinkedIn accounts in recent years, Microsoft has introduced Entra Verified ID, a new feature…

The new weakest link in the cybersecurity chain
13
Apr
2023

The new weakest link in the cybersecurity chain

It used to be that people were the greatest cybersecurity vulnerability, but this is no longer true. The rise of…

Wazuh 4.4 combats breaches, ransomware, and cyberattacks all from a single agent
13
Apr
2023

Wazuh 4.4 combats breaches, ransomware, and cyberattacks all from a single agent

Wazuh launched Wazuh 4.4, the latest version of its open source security platform. The latest version adds multiple new features,…

Cynalytica OTNetGuard provides visibility into critical infrastructure networks
13
Apr
2023

Cynalytica OTNetGuard provides visibility into critical infrastructure networks

Cynalytica has launced its Industrial Control System (ICS/SCADA) monitoring sensor, OTNetGuard, that passively and securely captures analog, serial, and IP…

Technology investments feel the impact of weakening economy
13
Apr
2023

Technology investments feel the impact of weakening economy

For the fifth consecutive month, IDC has lowered its 2023 forecast for worldwide IT spending as technology investments continue to…

5 steps to building NSA-level access control for your app
13
Apr
2023

5 steps to building NSA-level access control for your app

Access control has become a main concern when it comes to developing secure web applications, and the NSA has a…

DDoS alert traffic reaches record-breaking level of 436 petabits in one day
13
Apr
2023

DDoS alert traffic reaches record-breaking level of 436 petabits in one day

With over one billion websites worldwide, HTTP/HTTPS application-layer attacks have increased by 487% since 2019, with the most significant surge…

Binarly Transparency Platform identifies vulnerabilities and malicious threats in code
13
Apr
2023

Binarly Transparency Platform identifies vulnerabilities and malicious threats in code

Binarly has released the Binarly Transparency Platform, delivering transparency for device supply chains enabling device manufacturers and endpoint protection products…

Rezonate's new ITDR module empowers security teams to stop active threats in real-time
13
Apr
2023

Rezonate’s new ITDR module empowers security teams to stop active threats in real-time

Rezonate’s ITDR offering detects and responds to active identity threats using both common and sophisticated techniques missed by traditional IAM…