Contrast Security integrates with AWS Security Hub to help organizations mitigate threats
Contrast Security, the code security platform built for developers and trusted by security, today announced its integration with Amazon Web Services (AWS) Security Hub to offer full-spectrum security visibility, from infrastructure to applications. A.....»»
Apple releases iOS 17.7 with security fixes as an iOS 18 alternative
Today Apple released iOS 18, the flagship software update for iPhones. But at the same time, a new version of iOS 17 has been released too. iOS 17.7 offers an alternative to iOS 18 for users, bringing key security fixes to last year’s software......»»
Apple Pay now integrates with Affirm on iOS 18 following ‘Apple Pay Later’ discontinuation
Remember Apple Pay Later? The buy-now-pay-later service from Apple barely launched before the company decided to nerf it. Replacing Apple’s BNPL option is integration with more widely available options. As of today, the popular BNPL service from Af.....»»
Sourcepoint helps companies mitigate vulnerabilities across various privacy regulations
Sourcepoint announced significant enhancements to its compliance monitoring suite. These solutions are designed to help companies navigate the increasingly complex landscape of digital privacy laws and mitigate risks associated with the growing trend.....»»
Also releasing today: New iOS 17, macOS 14 updates for the upgrade-averse
Security updates without the headaches for the risk-averse (and bug-averse). Enlarge Today is the official release date for the public versions of iOS 18, iPadOS 18, macOS 15 Sequoia, and a scad of other Apple software.....»»
23andMe set to pay millions to settle data breach lawsuit
If the judge approves the settlement terms, 23andMe will pay out millions and will have to run regular security audits......»»
"Fight is coming": UAW, VW brace for start of bargaining
Profit sharing, COLA, retirement security, affordable health care and the elimination of tiers appear to be the UAW's focus points for bargaining with VW......»»
Compliance frameworks and GenAI: The Wild West of security standards
In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional software. Unlike predictable software, GenAI introduces dynamic, evolving threats, requiring new strategies for d.....»»
eBook: Navigating compliance with a security-first approach
As cyberattacks escalate, more regulations are being introduced to help protect organizations and their customers’ data. This has resulted in a complex web of legislation with which companies in the private sector must comply. It can be challenging.....»»
The ripple effects of regulatory actions on CISO reporting
In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how recent regulatory actions and high-profile legal incidents involving cybersecurity leaders have influenced CISO reporting. In a recent report of the CISO Circu.....»»
"Fight is coming:" UAW, VW brace for start of bargaining
Profit sharing, COLA, retirement security, affordable health care and the elimination of tiers appear to be the UAW's focus points for bargaining with VW......»»
Apple @ Work: Let’s talk about Touch ID, Identity Provider integration, and what Apple needs to do next
Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & p.....»»
Windows is still making changes to prevent another CrowdStrike-type disaster
After what happened with CrowdStrike, Microsoft wants to ensure that the incident doesn't repeat itself by making some important changes to its security......»»
GAZEploit could work out Vision Pro user passwords from watching their avatars [Fixed]
Security researchers came up with a pretty wild Vision Pro exploit. Dubbed GAZEploit, it’s a method of working out the passwords of Vision Pro users by watching the eye movements of their avatars during video calls. They’ve put together a YouT.....»»
Nudge Security unveils SSPM capabilities to strengthen SaaS security
Nudge Security unveiled new SSPM (SaaS security posture management) capabilities for its SaaS security and governance platform. This enhancement creates the industry’s most comprehensive solution of its kind, combining SaaS discovery, security.....»»
Organizations still don’t know how to handle non-human identities
Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The high volume of NHIs significantly amplifies the security challenges organizations face. Each.....»»
Security measures fail to keep up with rising email attacks
Organizations must reassess their email security posture as incidents continue to escalate, leading to financial losses. Key findings reveal a significant increase in email attacks, with many successfully bypassing standard security protocols and tar.....»»
New infosec products of the week: September 13, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Druva, Huntress, Ketch, LOKKER, Tenable, Trellix, and Wing Security. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins T.....»»
Adobe Acrobat Reader has a serious security flaw — so patch now
A bug allows threat actors to launch malicious code on Acrobat Reader remotely, and it's already being used in the wild......»»
GAZEploit can work out Vision Pro user passwords from watching their avatars
Security researchers have come up with a pretty wild Vision Pro exploit. Dubbed GAZEploit, it’s a method of working out the passwords of Vision Pro users by watching the eye movements of their avatars during video calls. They’ve put together a.....»»
Dru Investigate simplifies cyber investigations and helps users uncover data threats
Druva launched Dru Investigate, a gen AI-powered tool that guides data security investigations using a natural language interface. With Dru Investigate, users across IT, security, legal, and privacy teams can swiftly identify and mitigate data risks,.....»»