Druva’s cyber attack readiness capabilities accelerate incident response
Druva announced it has expanded its cyber resilience portfolio with cyber attack readiness innovations, including new capabilities for data posture assessment and observability. These advanced tools provide customers with a centralized view of their.....»»
Tidal Cyber empowers organizations to improve their protection efforts
Tidal Cyber announced that it now incorporates test results from Breach and Attack Simulation (BAS) tools and other sources to complement the company’s existing Threat-Informed Defense capabilities. With this new integration, Tidal Cyber Enterprise.....»»
Bitwarden integrates with Microsoft Sentinel to strengthen real-time threat detection
Bitwarden expanded its integration capabilities with the release of a Microsoft Sentinel integration to enhance security information and event management (SIEM) for organizations. Security teams can now monitor, detect, and respond to password manage.....»»
Edgio Premier Bot Manager detects, classifies and mitigates bot traffic
Edgio launched Premier Bot Manager, a next-generation bot management solution designed to protect enterprise applications against increasingly sophisticated automated threats. Premier Bot Manager introduces enhanced detection capabilities, AI-powered.....»»
Commvault Cloud Rewind helps businesses bounce back from cyber incidents
Commvault launched Cloud Rewind on the Commvault Cloud platform. This offering, which integrates cloud-native distributed application recovery and rebuild capabilities from the Appranix acquisition, gives cloud-first organizations a secret weapon to.....»»
Netwrix Threat Manager 3.0 prevents improper changes in Microsoft Entra ID
Netwrix released a new version of Netwrix Threat Manager. The upgrade expands the product’s capabilities to the cloud environment of Microsoft Entra ID (formerly Azure AD) in addition to on-premises instances of Active Directory (AD). Now, real.....»»
iOS 18.1 makes Apple Photos better in three key ways, here’s what’s coming
iOS 18.1 will arrive later this month, bringing with it a ton of new capabilities to iPhone users—particularly through Apple Intelligence. There are three AI-powered upgrades set for Apple Photos in iOS 18.1 that make the app better than ever. Here.....»»
Chinese hack of US ISPs shows why Apple is right about backdoors for law enforcement
It was revealed this weekend that Chinese hackers managed to access systems run by three of the largest internet service providers (ISPs) in the US. What’s notable about the attack is that it compromised security backdoors deliberately created t.....»»
MediaTek phones will soon support Gemini Nano multimodality
It looks like future MediaTek powered phones will come with support for on-device Gemini Nano processing capabilities. The post MediaTek phones will soon support Gemini Nano multimodality appeared first on Phandroid. AI requests made on ou.....»»
BreachLock Attack Surface Analytics strengthens enterprise CTEM capabilities
BreachLock strengthens continuous threat exposure management (CTEM) capabilities for enterprise customers with its new Attack Surface Analytics feature. Time is of the essence when Fortune 500 security teams find themselves waking up to a Code Red vu.....»»
AI and quantum mechanics team up to accelerate drug discovery
Drug discovery is much like working a jigsaw puzzle. The chemical compounds behind drug molecules must be shaped to fit with the proteins in our bodies to produce therapeutic effects. That requirement for a meticulous fit means the creation of new dr.....»»
Colleges could benefit from taking a data-driven look at hostility toward Jews on campus
In the year that has passed since the Oct. 7 attack by Hamas on Israel, college campuses have been embroiled in debates about the resulting conflict. A major focus of these debates has been the surge in reports of antisemitic harassment of Jewish stu.....»»
SOC teams are frustrated with their security tools
Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust in v.....»»
The case for enterprise exposure management
For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and.....»»
Phage cocktail shows promise against drug-resistant bacteria
Researchers have a new battle tactic to fight drug-resistant bacterial infections. Their strategy involves using collections of bacteriophages, viruses that naturally attack bacteria. In a new study, researchers at the University of Chicago Pritzker.....»»
New infosec products of the week: October 4, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift, SAFE Security, Veeam Software, and Legit Security. SAFE X equips CISOs with integrated data from all their existing cyber.....»»
Cybercriminals capitalize on poorly configured cloud environments
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike and Me.....»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Toyota curbs DEI policy after activist attack over LGBTQ support
Toyota Motor Corp. will refocus DEI programs and halt sponsorship of LGBTQ events......»»
Study suggests statistical "noise" affects perceived evolutionary rates
For decades, researchers have observed that rates of evolution seem to accelerate over short time periods—say five million years versus fifty million years. This broad pattern has suggested that "younger" groups of organisms, in evolutionary terms,.....»»
Darktrace brings real-time cloud detection and response to Microsoft Azure customers
Darktrace announced the expansion of Darktrace / CLOUD to support Microsoft Azure environments. The AI-driven Cloud Detection and Response (CDR) system leverages Microsoft’s virtual network flow logs for agentless deployment, slashing deploymen.....»»