Elevate Identity enables security teams to automate customization of conditional access policies
Elevate Security has released Elevate Identity, its SaaS offering for Identity and Access Management (IAM) Professionals that integrates Elevate’s user risk profiling capability with IAM tools such as Cisco Duo, Crowdstrike Falcon, and Microsoft Az.....»»
Giraffes" uphill battle: Slopes more than 20° pose challenges for their conservation
New research finds that giraffes much prefer flat terrain and do not traverse slopes of more than 20°, which severely limits the areas in, and outside, protected reserves they can access. The findings, which are yet to be published, were presented a.....»»
Celigo Private Cloud enhances security and connectivity
Celigo introduced Celigo Private Cloud, a transformative solution offering enterprises fully private automation instances. Designed for businesses that prioritize enhanced security, control, and compliance, Celigo Private Cloud empowers organizations.....»»
Rubrik Turbo Threat Hunting accelerates cyber recovery
As organizations around the world struggle with extended downtime and revenue loss due to widespread cyberattacks, Rubrik announces Rubrik Turbo Threat Hunting. This new feature is designed to accelerate cyber recovery and enables organizations to lo.....»»
Proteomics method identifies ligand-binding proteins and binding sites in complex systems
In a study published in Nature Methods, a research group developed a highly sensitive proteomics method called peptide-centric local stability assay (PELSA), which enables the simultaneous identification of ligand-binding proteins and their binding s.....»»
New infosec products of the week: December 13, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Horizon3.ai, SecureAuth, Stamus Networks, Trellix, and Versa Networks. Trellix Drive Encryption enhances security against insider attacks Trel.....»»
Tackling software vulnerabilities with smarter developer strategies
In this Help Net Security interview, Karl Mattson, CISO at Endor Labs, discusses strategies for enhancing secure software development. Mattson covers how developers can address vulnerabilities in complex systems, ways organizations can better support.....»»
Critical WordPress plugin vulnerability under active exploit threatens thousands
Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000 sites. Thousands of sites running WordPress remain unpatched against a critical security flaw in.....»»
Apple Wallet digital IDs are now available in 10 areas. Here are the newest ones
Access to Digital IDs and driver's licenses through Apple Wallet is coming to two more locations — and the total number of supported areas has increased to 10......»»
A new test shows Microsoft Recall’s continued security problems
Microsoft's Recall feature and its new security standards are being tested by Windows Insiders again, and still creating problems......»»
Nanopatterned graphene enables infrared "color" detection and imaging
University of Central Florida (UCF) researcher Debashis Chanda, a professor at UCF's NanoScience Technology Center, has developed a new technique to detect long wave infrared (LWIR) photons of different wavelengths or "colors.".....»»
LastPass Business can protect all business teams big and small
I think we all know at this point that you shouldn’t be sharing account details and passwords with anyone. And yet, that can be quite difficult to pull off when you’re working with a team. Several people may need access to an account for.....»»
There’s still time to try Amazon Music Unlimited for three months free
There's still time to try Amazon Music Unlimited for free, for three months, which now includes access to Audible audiobooks......»»
United enables Apple’s lost luggage recovery tool for airline flubs
United and Air Canada are the first airline services to let customers use Apple's Find My link for their lost luggage to speed up the process of recovering it......»»
Cleo patches zero-day exploited by ransomware gang
Cleo has released a security patch to address the critical vulnerability that started getting exploited while still a zero-day to breach internet-facing Cleo Harmony, VLTrader, and LexiCom instances. Version 5.8.0.24 of the three products, which was.....»»
Security cameras and alarms effective at deterring burglars, say burglars
If you’ve ever wondered whether security cameras and alarms are effective at deterring burglars, the answer is yes – and that comes from a very reliable source: burglars. KGW-TV asked 86 inmates convicted of burglary what would make them more.....»»
We must adjust expectations for the CISO role
Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely int.....»»
Citrix acquires deviceTRUST and Strong Network
With the widespread adoption of hybrid work models, where teams operate across geographical regions on managed and unmanaged devices, every connection and endpoint presents a potential security risk. Addressing this challenge, Citrix announced the st.....»»
Exposed APIs and issues in the world’s largest organizations
In this Help Net Security video, Tristan Kalos, CEO of Escape, discusses the results of its 2024 State of API Exposure report. The study highlights significant API security gaps affecting Fortune 1000 organizations, with over 28,500 exposed APIs and.....»»
Shaping effective AI governance is about balancing innovation with humanity
In this Help Net Security interview, Ben de Bont, CISO at ServiceNow, discusses AI governance, focusing on how to foster innovation while ensuring responsible oversight. He emphasizes the need for collaboration between technologists, policymakers, an.....»»
Keycloak: Open-source identity and access management
Keycloak is an open-source project for identity and access management (IAM). It provides user federation, strong authentication, user management, authorization, and more. Keycloak is based on standard protocols and supports OpenID Connect, OAuth 2.0,.....»»