Deepfence Cloud protects cloud native applications and infrastructure against cybersecurity threats
Deepfence launched Deepfence Cloud, a fully managed offering that enables customers to deploy Deepfence’s security observability solution across multiple cloud platforms. With Deepfence Cloud, enterprise security teams can now gain comprehensive vi.....»»
Guide for selecting the right GRC framework, EU edition
Governance, risk, and compliance frameworks are critical. They enable cybersecurity professionals to accurately identify an organization’s risk posture, align business and strategic objectives with technology, and meet compliance responsibilities......»»
Edgio Premier Bot Manager detects, classifies and mitigates bot traffic
Edgio launched Premier Bot Manager, a next-generation bot management solution designed to protect enterprise applications against increasingly sophisticated automated threats. Premier Bot Manager introduces enhanced detection capabilities, AI-powered.....»»
Commvault Cloud Rewind helps businesses bounce back from cyber incidents
Commvault launched Cloud Rewind on the Commvault Cloud platform. This offering, which integrates cloud-native distributed application recovery and rebuild capabilities from the Appranix acquisition, gives cloud-first organizations a secret weapon to.....»»
Netwrix Threat Manager 3.0 prevents improper changes in Microsoft Entra ID
Netwrix released a new version of Netwrix Threat Manager. The upgrade expands the product’s capabilities to the cloud environment of Microsoft Entra ID (formerly Azure AD) in addition to on-premises instances of Active Directory (AD). Now, real.....»»
Microsoft Defender review: Is Windows default antivirus safe enough?
I reviewed Microsoft Defender to find out how well the free antivirus software included with Windows protects your computer and your personal data......»»
Ivanti fixes three CSA zero-days exploited in the wild (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)
Ivanti has patched three additional Cloud Service Appliance (CSA) zero-day flaws, which have been exploited by attackers in conjuction with a zero-day bug the company accidentally fixed in September. The fixed zero-days “We are aware of a limit.....»»
Cryo-electron microscopy provides new insights into the cell"s repair system
The membrane that surrounds cells in living organisms is extremely flexible and sensitive. How it protects itself from damage and renews itself is crucial for many life processes, and is not yet fully understood in detail. Scientists at Forschungszen.....»»
2025 Swift Student Challenge submissions will open in February
Apple has announced that its next annual Swift Student Challenge will open for submissions in February 2025. You can sign up today to be notified when applications open. As usual, Apple will select 350 winners, and the top 50 of them will be invit.....»»
iPhone Mirroring is currently a privacy and legal risk on work Macs
One of the new features of iOS 18 and macOS Sequoia is iPhone Mirroring – but using this with a personal iPhone on a work Mac currently creates a privacy risk for employees, and a legal risk for businesses. The problem, as cybersecurity company.....»»
SimSpace’s OT content enhancements improve critical infrastructure security
SimSpace announced its enhanced OT (Operational Technology) content, now offering more realistic and high-fidelity training and emulation. As OT cybersecurity becomes increasingly critical for industries relying on operational systems, SimSpace has i.....»»
Juniper Secure AI-Native Edge accelerates detection of potential network threats
Juniper Networks announced its new Juniper Secure AI-Native Edge solution, with a new Security Assurance product, combining Juniper Mist’s AI-Native and cloud-native network operations with the efficacy security solution. By integrating network and.....»»
OTAVA S.E.C.U.R.E. Score simplifies cybersecurity strategy for businesses
OTAVA introduced the OTAVA S.E.C.U.R.E. Score to help businesses further improve their security posture. The S.E.C.U.R.E. Score is a dynamic metric that assesses vulnerabilities, and makes recommendations on how to close security gaps and minimize ri.....»»
Data analysis navigates lookalikes to try to pin down the true number of mouse lemur species
In some parts of the world, animals are going extinct before scientists can even name them. Such may be the case for mouse lemurs, the saucer-eyed, teacup-sized primates native to the African island of Madagascar. There, deforestation has prompted th.....»»
SOC teams are frustrated with their security tools
Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust in v.....»»
Transforming cloud security with real-time visibility
In this Help Net Security interview, Amiram Shachar, CEO at Upwind, discusses the complexities of cloud security in hybrid and multi-cloud environments. He outlines the need for deep visibility into configurations and real-time insights to achieve a.....»»
Meet the shared responsibility model with new CIS resources
You can’t fulfill your end of the shared responsibility model if you don’t emphasize secure configurations. Depending on the cloud services you’re using, you’re responsible for configuring different things. Once you figure out.....»»
What"s the best material for a lunar tower?
Physical infrastructure on the moon will be critical to any long-term human presence there as both America and China gear up for a sustained human lunar presence. Increasingly, a self-deploying tower is one of the most essential parts of that physica.....»»
Cybercriminals capitalize on poorly configured cloud environments
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike and Me.....»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Hexagonal magnetic defects could lead to energy-efficient neuromorphic computing
Artificial intelligence applications are experiencing a boom and expected to be mainstream technologies in the near future. However, these applications run on classic computing hardware and are extremely power-hungry......»»