Category: HelpnetSecurity

16
Feb
2023

LogRhythm and Trend Micro help organizations defend their critical assets

Together, LogRhythm and Trend Micro are empowering security teams to confidently navigate a changing threat landscape and quickly secure their…

16
Feb
2023

CompTIA collaborates with IBM to prepare more people for tech-related careers

CompTIA has reported that up to 2,000 people across the country, from communities that are underrepresented in technology, will be…

15
Feb
2023

SynSaber OT PCAP Analyzer simplifies the network analysis process

SynSaber has launched OT PCAP Analyzer tool that allows users to view a high-level breakdown of the device and protocol…

15
Feb
2023

Akamai Connected Cloud helps enterprises deploy and secure distributed applications

Akamai Technologies has launched Akamai Connected Cloud, a massively distributed edge and cloud platform for cloud computing, security, and content…

15
Feb
2023

ThreatBlockr platform updates prioritize alert management

ThreatBlockr introduced major updates and features to its platform. The release improves flexibility, control, and visibility, with key updates including…

15
Feb
2023

CyberSaint Executive Dashboard empowers CISOs to take control of cyber risk communication

CyberSaint’s Executive Dashboard allows CISOs to present their cyber risk posture to the rest of the C-suite and Board of…

15
Feb
2023

Finite State releases Next Gen Platform for software supply chain security

Finite State has released its Next Generation Platform featuring extended SBOM management with the ability to ingest and aggregate 120+…

15
Feb
2023

The risks and benefits of starting a vCISO practice

There is a definite trend of MSPs shifting into security. There are a number of very good reasons for this,…

15
Feb
2023

Combining identity and security strategies to mitigate risks

Last week, the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk…

15
Feb
2023

Introducing the book – Threats: What Every Engineer Should Learn From Star Wars

Adam Shostack, the author of “Threat Modeling: Designing for Security”, and the co-author of “The New School of Information Security”,…

15
Feb
2023

Attack surface management (ASM) is not limited to the surface

Another year of high-profile cyberattacks, another year of beating the cybersecurity drums. Clearly, we’re missing a few notes. Attack surface…

15
Feb
2023

Ping Identity and Deloitte secure identities and data across digital engagement channels

Ping Identity has formed a new strategic alliance with Deloitte to help the organizations’ shared clients improve advanced Identity Access…