Allurity acquires CSIS Security Group to expand its services into new markets
Allurity has acquired the leading Danish service provider CSIS Security Group A/S (“CSIS”), taking yet another leap towards its goal of becoming Europe’s preferred provider of tech-enabled cybersecurity services. Founded in 2003, CSIS has built.....»»
Apple expands iPhone satellite services deal, commits $1.1bn to expand capacity
Satellite services provider GlobalStar today disclosed an expansion of its deal with Apple. Apple will commit an additional $1.1 billion for upfront infrastructure prepayments, to increase the capacity of satellite services. Additionally, Apple will.....»»
Apple makes $1.1 billion commitment to expand satellite messaging
Apple is committing over a billion dollars more to its existing satellite provider GlobalStar in order to have it expand its ground bases and add more satellites for iPhone messaging.Image Credit: AppleTwo years after it first launched Emergency SOS.....»»
These 3 Important Social Security Changes Were Just Announced. Did You Miss Them?
These 3 Important Social Security Changes Were Just Announced. Did You Miss Them?.....»»
How open-source MDM solutions simplify cross-platform device management
In this Help Net Security interview, Mike McNeil, CEO at Fleet, talks about the security risks posed by unmanaged mobile devices and how mobile device management (MDM) solutions help address them. He also discusses employee resistance to MDM and how.....»»
50% of financial orgs have high-severity security flaws in their apps
Security debt, defined for this report as flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt, according to Veracode. Financial s.....»»
Infosec products of the month: October 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Balbix, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, ExtraHop, Fastly, Frontegg, GitGuardian, IBM, Ivanti, Jumio, Kusari, Legit Security,.....»»
Threat actors are stepping up their tactics to bypass email protections
Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass these systems. With the development of AI technology, phishing is becoming increasingly difficult to rec.....»»
Not just ChatGPT anymore: Perplexity and Anthropic’s Claude get desktop apps
Both hit weeks after OpenAI released a ChatGPT app. There's a lot going on in the world of Mac apps for popular AI services. In the past week, Anthropic has released a desktop app.....»»
You have one year to safely use Windows 10 before you’ll need to pay
Microsoft is bring its ESU program to consumers for the first time, allowing Windows 10 lovers to opt in for an extra year of security updates......»»
Apple VP behind Fitness+ is now becoming Peloton’s CEO and President
Peloton has announced Peter Stern as its new CEO and President, and he just happens to be a former Apple VP who had oversight of services while at the company. One of his former projects? The launch and growth of Apple Fitness+. more….....»»
Consumers won’t be offered all three years of extended Windows 10 security updates
Home users can opt in for a single year of updates at $30 per PC—not 3 years. Most Windows 10 PCs will stop getting new security updates in October 2025, less than a year from t.....»»
Over 500 Amazon workers decry “non-data-driven” logic for 5-day RTO policy
“I used to be proud of my work and excited about my future here. I don't feel that anymore." More than 500 Amazon workers reportedly signed a letter to Amazon Web Services' (AWS.....»»
Apple VP behind Fitness+ is now becoming Peleton’s CEO and President
Peleton has announced Peter Stern as its new CEO and President, and he just happens to be a former Apple VP who had oversight of services while at the company. One of his former projects? The launch and growth of Apple Fitness+. more….....»»
Claro Enterprise Solutions helps organizations identify vulnerabilities within Microsoft 365
Claro Enterprise Solutions launched Collaboration Security Management solution. This comprehensive service addresses critical security challenges related to file sharing, data loss events, or unknown shadow users, faced by organizations using Microso.....»»
North Korean hackers pave the way for Play ransomware
North Korean state-sponsored hackers – Jumpy Pisces, aka Andariel, aka Onyx Sleet – have been spotted burrowing into enterprise systems, then seemingly handing matters over to the Play ransomware group. Timeline of the attack (Source: Pal.....»»
Cynet enables 426% ROI in Forrester Total Economic Impact Study
Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024. The Total Economic Impact Study framework h.....»»
Google on scaling differential privacy across nearly three billion devices
In this Help Net Security interview, Miguel Guevara, Product Manager, Privacy Safety and Security at Google, discusses the complexities involved in scaling differential privacy technology across large systems. He emphasizes the need to develop secure.....»»
99% of CISOs work extra hours every week
The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program needed or meet compliance requirements, according to DirectDefense. Cybersecurity industry faces ongoing talent shorta.....»»
Why cyber tools fail SOC teams
A recent Vectra AI report highlights a growing distrust of threat detection tools. 47% of respondents note they do not trust their tools to work the way they need them to. Moreover, 60% of SOC practitioners say security vendors flood them with pointl.....»»
How agentic AI handles the speed and volume of modern threats
In this Help Net Security interview, Lior Div, CEO at Seven AI, discusses the concept of agentic AI and its application in cybersecurity. He explains how it differs from traditional automated security systems by offering greater autonomy and decision.....»»