Advertisements


New Yubico security keys let you log in with a tap to your USB-C port

Yubico's Security C NFC brings a USB-C security key at a lower price. Enlarge (credit: Yubico) Because of its power delivery, high transfer rates, and Thunderbolt capabilities, USB-C has become ubiquitous on modern devices. T.....»»

Category: topSource:  arstechnicaOct 26th, 2021

Acronis XDR enhances EDR with comprehensive cybersecurity for MSPs

Acronis has introduced Acronis Advanced Security + XDR the newest addition to the company’s security solution portfolio. Easy to deploy, manage, and maintain, Acronis XDR expands on the current endpoint detection and response (EDR) offering and del.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

Splunk’s security innovations boost threat detection and response

Splunk announced new security innovations aimed at bolstering threat detection and security operations across multiple data sources. These advancements include Splunk Enterprise 8.0, which empowers security teams to proactively manage and mitigate ri.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

AWS unveils new and improved security features

At its annual re:Inforce conference, Amazon Web Services (AWS) has announced new and enhanced security features and tools. Additional multi-factor authentication option To facilitate the concerted push to get customers to secure their accounts with m.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

Six months of SEC’s cyber disclosure rules

In this Help Net Security video, Mark Millender, Senior Advisor of Global Executive Engagement at Tanium, discusses the overall sentiment from CISOs of large, public companies on the effectiveness and understanding of SEC’s cyber disclosure rul.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

Cybersecurity jobs available right now: June 12, 2024

Cloud Security Engineer Metacore | Germany | Hybrid – View job details As a Cloud Security Engineer, you will develop, implement, and maintain cloud security architecture, policies, and procedures. You will collaborate with game and i.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

Security and privacy strategies for CISOs in a mobile-first world

In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introd.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

Open-source security in AI

New AI products are coming onto the market faster than we have seen in any previous technology revolution. Companies’ free access and right to use open source in AI software models has allowed them to prototype an AI product to market cheaper than.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

Obsidian Security and Databricks collaborate to protect sensitive business data

Obsidian Security announced a strategic partnership with Databricks. This alliance strengthens the security of applications built on the Databricks Data Intelligence Platform and helps customers enact their data security and compliance strategy. With.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

SentinelOne strengthens cloud security for AWS customers

SentinelOne announced Singularity Cloud Workload Security for Serverless Containers, a new offering that provides real-time, AI-powered protection to secure containerized workloads running on AWS Fargate for Amazon ECS and Amazon EKS. “As a long-ti.....»»

Category: securitySource:  netsecurityRelated NewsJun 12th, 2024

The importance of Hardware Security Modules (HSMs) strategy explained

The importance of Hardware Security Modules (HSMs) strategy explained.....»»

Category: topSource:  pcmagRelated NewsJun 12th, 2024

PNY Elite-X Type-C Drive review: Small size, huge convenience

The PNY Elite-X Type C Drive is a cheap, quick, and extremely portable storage solution for anyone who needs a few dozen Gigabytes in their pocket.PNY Elite-X Type-C Drive reviewAlmost every Apple device now has a USB-C port, and having a small drive.....»»

Category: appleSource:  appleinsiderRelated NewsJun 12th, 2024

Your Mac is about to killer security feature

Apple has debuted a new anti-tracking feature for macOS Sequoia to keep predators at bay......»»

Category: topSource:  digitaltrendsRelated NewsJun 11th, 2024

Protecto improves data security and privacy for GenAI apps in Databricks environments

Protecto announced its latest capabilities designed to protect sensitive enterprise data, such as PII and PHI, and block toxic content, such as insults and threats within Databricks environments. This enhancement is pivotal for organizations relying.....»»

Category: securitySource:  netsecurityRelated NewsJun 11th, 2024

Security firm Cylance says it has been hacked, data put up for sale online

The data being sold for $750,000 includes millions of email addresses......»»

Category: topSource:  informationweekRelated NewsJun 11th, 2024

Neutrinos: The inscrutable “ghost particles” driving scientists crazy

The particles hold the keys to new physics. If only we could understand them. Enlarge / The Super-Kamiokande neutrino detector at the Kamioka Observatory in Japan. (credit: Kamioka Observatory, ICRR (Institute for Cosmic Ray Rese.....»»

Category: topSource:  arstechnicaRelated NewsJun 11th, 2024

Fortinet acquires Lacework to boost cloud security portfolio

Fortinet has entered into a definitive agreement to acquire Lacework, the data-driven cloud security company. Lacework delivers an AI-powered cloud security platform that seamlessly integrates all critical CNAPP services. With patented AI and machine.....»»

Category: securitySource:  netsecurityRelated NewsJun 11th, 2024

Apple announces security updates across its platforms

Apple announced new updates across its platforms that help empower users and keep them in control of their data. Private Cloud Compute extends protections of iPhone to the cloud, so that users don’t have to choose between powerful intelligence grou.....»»

Category: securitySource:  netsecurityRelated NewsJun 11th, 2024

Security providers view compliance as a high-growth opportunity

85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the most common roadblocks to offering managed compliance, according to Apptega......»»

Category: securitySource:  netsecurityRelated NewsJun 11th, 2024

GDPR turns six: Expert discusses AI impact

The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has questioned its suitability and relevance. In this Help Net Security vide.....»»

Category: securitySource:  netsecurityRelated NewsJun 11th, 2024

Cloud migration expands the CISO role yet again

The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud envir.....»»

Category: securitySource:  netsecurityRelated NewsJun 11th, 2024