Category: HelpnetSecurity

23
May
2023

Hornetsecurity 365 Permission Manager helps companies protect critical data

Hornetsecurity launched 365 Permission Manager – a user-friendly, admin-centred solution to manage permissions, enforce compliance policies, and monitor violations within…

23
May
2023

Radware Cloud Web DDoS Protection blocks Tsunami DDoS attacks

Radware has introduced a new Cloud Web DDoS Protection solution to minimize the growing gap between standard DDoS mitigation and…

23
May
2023

Veriff Age Estimation prevents users from accessing age restricted products or services

Veriff announced its new Age Estimation solution, built to further streamline the age verification process for customers. Veriff Age Estimation…

23
May
2023

Simple OSINT techniques to spot AI-fueled disinformation, fake reviews

Error messages that ChatGPT and other AI language models generate can be used to uncover disinformation campaigns, hate speech and…

23
May
2023

7 access management challenges during M&A

Integrating an acquired company into a single organization is a daunting task that can take weeks, months, or even years…

23
May
2023

The fragmented nature of API security ownership

While API security remains a top cybersecurity concern this year, there is still an alarming lack of implementation for most…

23
May
2023

Online scams target bargain-hunting holiday travelers

30% of adults have fallen victim or know someone who has fallen victim to an online scam while trying to…

22
May
2023

Blacklist untrustworthy apps that peek behind your firewall

With an increasing number of endpoints and expanding attack surfaces, dodgy apps can offer a way around your firewall. Due…

22
May
2023

Wireless Broadband Alliance CEO on key drivers for Wi-Fi adoption in enterprise networks

The demand for robust, reliable, and high-speed connectivity is increasing rapidly in the era of relentless digital transformation. This Help…

22
May
2023

What flying a plane can teach you about cybersecurity

Before taking on the role as GM of IAI’s cyber division, Esti Peshin was a member of Israel’s parliament, wielding…

22
May
2023

Malicious links and misaddressed emails slip past security controls

The majority of organizations use six or more communication tools, across channels, with email remaining the channel seen as the…

21
May
2023

Week in review: KeePass vulnerability, Apple fixes exploited WebKit 0-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple fixes WebKit 0-days under…