LMG Security expands its cybersecurity solutions and services
LMG Security has expanded its selection of cybersecurity advisory, testing, and training services with a new line of cybersecurity solutions. These solutions are designed to reduce the burden organizations face from implementing or managing cybersecu.....»»
Apple’s Q2 2024 earnings reveal a drop in iPhone, iPad sales
Services growth looked rosy as Apple's hardware revenue in China slowed. Enlarge / The Apple Park campus in Cupertino, California. (credit: Anadolu Agency | Getty) Apple's earnings report for the second quarter of the co.....»»
Apple vastly expands Figma support with new set of design templates
Apple today has added nine new design templates to its collection of Figma resources, significantly increasing the number of resources available for Figma users. Previously the available resources focused solely on key operating systems like iOS.....»»
Microsoft finally lets users sign into accounts with passkeys
Microsoft has rolled out support for passkeys to all consumer accounts, allowing users to log into services without using a password.Microsoft passkey supportPasskeys are slowly growing in popularity with services, since they offer a secure way to au.....»»
One UI 6.1 Issues Plaguing Galaxy Users
As Samsung’s One UI 6.1 and Galaxy AI roll out expands, so does the list of complaints about the software’s issues. In April, Samsung started pushing One UI 6.1 with Galaxy AI features to devices like the Galaxy S23 and Galaxy Tab S9. Now.....»»
Proofpoint DLP Transform secures data moving to ChatGPT, copilots, and other GenAI tools
Proofpoint announced Data Loss Prevention (DLP) Transform, including GenAI use cases. Today, businesses struggle with the limitations of legacy DLP solutions that are fragmented across channels and are not designed to address today’s most problemat.....»»
Secure Code Warrior SCW Trust Score quantifies the security posture of developer teams
Secure Code Warrior unveiled SCW Trust Score, a benchmark that quantifies the security posture of organizations’ developer teams. SCW Trust Score provides a vital baseline of the impact of their learning programs, assesses its effectiveness, and en.....»»
Trend Micro expands AI-powered cybersecurity platform
Trend Micro launched significant additional AI-powered functionality in its platform to secure organizational use of AI and better manage the risks associated with mass adoption of new AI tools. “Great advancements in technology always come wit.....»»
New SOHO router malware aims for cloud accounts, internal company resources
Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account credentials / secrets for AWS, CloudFlare, Docker, BitBucket, Alibaba Cloud and other cloud-based services......»»
Veracode platform enhancements help organizations reduce application risk
Veracode announced platform innovations that set a new standard for developer-powered application security. New repo risk visibility and analysis from Longbow Security, powered by Veracode, speeds up remediation of application risk from code reposito.....»»
CalypsoAI introduces customizable generative AI security scanners for enterprises
CalypsoAI introduced two AI security solutions to the CalypsoAI SaaS platform: next gen security scanners and enhanced security functionalities for chat platforms such as Slack and Microsoft Teams. These new capabilities are designed to empower enter.....»»
Nord Security unveils NordStellar, a platform for advanced cyber threat detection and response
Nord Security introduces NordStellar, a next-generation threat exposure management platform. Created by developers of VPN solution NordVPN, the enterprise cyber threat exposure management platform helps businesses detect and respond to cyber threats,.....»»
Lineaje OSM improves software supply chain security
Lineaje unveiled Open-Source Manager (OSM), which brings transparency to open-source software components in applications and proactively manages and mitigates associated risks. Lineaje’s OSM enables full lifecycle governance of open-source software.....»»
Snyk AppRisk Pro leverages AI and third-party integrations for faster risk mitigation
Snyk has released Snyk AppRisk Pro, pairing artificial intelligence (AI) with application context from third-party integrations to help application security (AppSec) and development teams address business-critical risk and accelerate fixes. Snyk AppR.....»»
Venafi launches 90-Day TLS Readiness Solution
Venafi launched its new 90-Day TLS Readiness Solution to help organizations comply with Google’s proposed 90-day TLS certificate standard, improving security posture while reducing the risk of certificate-related interruptions. According to a V.....»»
Deep Instinct DIANNA provides malware analysis for unknown threats
Deep Instinct announced the launch of Deep Instinct’s Artificial Neural Network Assistant (DIANNA), an AI-based cybersecurity companion that provides explainability into unknown threats. DIANNA enhances Deep Instinct’s prevention-first approa.....»»
Skyhawk Security unveils cloud-native CTEM, streamlining security with AI-powered automation
Skyhawk Security has unveiled its cloud native Continuous Threat Exposure Management (CTEM) solution. The agentless approach empowers organizations to automate their CTEM program for the first time and operationalize it through Skyhawk’s existing A.....»»
Virsec releases security tools to offer ransomware protection
Virsec released TrustSight and TrustGuardian, its newest security tools in the fight against an ever-expanding threat environment – one where EDRs miss up to 30% of attacks, and ransomware detonates in milliseconds, according to various sources.....»»
Bitwarden Authenticator protects online services and applications
Bitwarden launched a standalone app for two-factor authentication (2FA) to protect online services and applications from unauthorized access. Bitwarden Authenticator generates and stores time-based one-time passwords (TOTP), enabling all users to add.....»»
Understanding emerging AI and data privacy regulations
In this Help Net Security interview, Sophie Stalla-Bourdillon, Senior Privacy Counsel & Legal Engineer at Immuta, discusses the AI Act, the Data Act, and the Health Data Space Regulation. Learn how these regulations interact, their implications for b.....»»
Women rising in cybersecurity roles, but roadblocks remain
The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several significant findings. These include promising trends in women’s entry into the profession, their roles wit.....»»