New Yubico security keys let you log in with a tap to your USB-C port
Yubico's Security C NFC brings a USB-C security key at a lower price. Enlarge (credit: Yubico) Because of its power delivery, high transfer rates, and Thunderbolt capabilities, USB-C has become ubiquitous on modern devices. T.....»»
Acronis XDR enhances EDR with comprehensive cybersecurity for MSPs
Acronis has introduced Acronis Advanced Security + XDR the newest addition to the company’s security solution portfolio. Easy to deploy, manage, and maintain, Acronis XDR expands on the current endpoint detection and response (EDR) offering and del.....»»
Splunk’s security innovations boost threat detection and response
Splunk announced new security innovations aimed at bolstering threat detection and security operations across multiple data sources. These advancements include Splunk Enterprise 8.0, which empowers security teams to proactively manage and mitigate ri.....»»
AWS unveils new and improved security features
At its annual re:Inforce conference, Amazon Web Services (AWS) has announced new and enhanced security features and tools. Additional multi-factor authentication option To facilitate the concerted push to get customers to secure their accounts with m.....»»
Six months of SEC’s cyber disclosure rules
In this Help Net Security video, Mark Millender, Senior Advisor of Global Executive Engagement at Tanium, discusses the overall sentiment from CISOs of large, public companies on the effectiveness and understanding of SEC’s cyber disclosure rul.....»»
Cybersecurity jobs available right now: June 12, 2024
Cloud Security Engineer Metacore | Germany | Hybrid – View job details As a Cloud Security Engineer, you will develop, implement, and maintain cloud security architecture, policies, and procedures. You will collaborate with game and i.....»»
Security and privacy strategies for CISOs in a mobile-first world
In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introd.....»»
Open-source security in AI
New AI products are coming onto the market faster than we have seen in any previous technology revolution. Companies’ free access and right to use open source in AI software models has allowed them to prototype an AI product to market cheaper than.....»»
Obsidian Security and Databricks collaborate to protect sensitive business data
Obsidian Security announced a strategic partnership with Databricks. This alliance strengthens the security of applications built on the Databricks Data Intelligence Platform and helps customers enact their data security and compliance strategy. With.....»»
SentinelOne strengthens cloud security for AWS customers
SentinelOne announced Singularity Cloud Workload Security for Serverless Containers, a new offering that provides real-time, AI-powered protection to secure containerized workloads running on AWS Fargate for Amazon ECS and Amazon EKS. “As a long-ti.....»»
The importance of Hardware Security Modules (HSMs) strategy explained
The importance of Hardware Security Modules (HSMs) strategy explained.....»»
PNY Elite-X Type-C Drive review: Small size, huge convenience
The PNY Elite-X Type C Drive is a cheap, quick, and extremely portable storage solution for anyone who needs a few dozen Gigabytes in their pocket.PNY Elite-X Type-C Drive reviewAlmost every Apple device now has a USB-C port, and having a small drive.....»»
Your Mac is about to killer security feature
Apple has debuted a new anti-tracking feature for macOS Sequoia to keep predators at bay......»»
Protecto improves data security and privacy for GenAI apps in Databricks environments
Protecto announced its latest capabilities designed to protect sensitive enterprise data, such as PII and PHI, and block toxic content, such as insults and threats within Databricks environments. This enhancement is pivotal for organizations relying.....»»
Security firm Cylance says it has been hacked, data put up for sale online
The data being sold for $750,000 includes millions of email addresses......»»
Neutrinos: The inscrutable “ghost particles” driving scientists crazy
The particles hold the keys to new physics. If only we could understand them. Enlarge / The Super-Kamiokande neutrino detector at the Kamioka Observatory in Japan. (credit: Kamioka Observatory, ICRR (Institute for Cosmic Ray Rese.....»»
Fortinet acquires Lacework to boost cloud security portfolio
Fortinet has entered into a definitive agreement to acquire Lacework, the data-driven cloud security company. Lacework delivers an AI-powered cloud security platform that seamlessly integrates all critical CNAPP services. With patented AI and machine.....»»
Apple announces security updates across its platforms
Apple announced new updates across its platforms that help empower users and keep them in control of their data. Private Cloud Compute extends protections of iPhone to the cloud, so that users don’t have to choose between powerful intelligence grou.....»»
Security providers view compliance as a high-growth opportunity
85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the most common roadblocks to offering managed compliance, according to Apptega......»»
GDPR turns six: Expert discusses AI impact
The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has questioned its suitability and relevance. In this Help Net Security vide.....»»
Cloud migration expands the CISO role yet again
The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud envir.....»»