Node4 acquires ThreeTwoFour to strengthen its security capabilities
Node4 announced the acquisition of ThreeTwoFour, an information security and technology risk specialist. The acquisition is Node4’s third significant growth purchase in the last 18 months, having also bought risual, an IT managed services and solut.....»»
Infosec products of the month: October 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Balbix, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, ExtraHop, Fastly, Frontegg, GitGuardian, IBM, Ivanti, Jumio, Kusari, Legit Security,.....»»
Threat actors are stepping up their tactics to bypass email protections
Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass these systems. With the development of AI technology, phishing is becoming increasingly difficult to rec.....»»
You have one year to safely use Windows 10 before you’ll need to pay
Microsoft is bring its ESU program to consumers for the first time, allowing Windows 10 lovers to opt in for an extra year of security updates......»»
Consumers won’t be offered all three years of extended Windows 10 security updates
Home users can opt in for a single year of updates at $30 per PC—not 3 years. Most Windows 10 PCs will stop getting new security updates in October 2025, less than a year from t.....»»
Claro Enterprise Solutions helps organizations identify vulnerabilities within Microsoft 365
Claro Enterprise Solutions launched Collaboration Security Management solution. This comprehensive service addresses critical security challenges related to file sharing, data loss events, or unknown shadow users, faced by organizations using Microso.....»»
Cynet enables 426% ROI in Forrester Total Economic Impact Study
Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024. The Total Economic Impact Study framework h.....»»
Google on scaling differential privacy across nearly three billion devices
In this Help Net Security interview, Miguel Guevara, Product Manager, Privacy Safety and Security at Google, discusses the complexities involved in scaling differential privacy technology across large systems. He emphasizes the need to develop secure.....»»
99% of CISOs work extra hours every week
The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program needed or meet compliance requirements, according to DirectDefense. Cybersecurity industry faces ongoing talent shorta.....»»
Why cyber tools fail SOC teams
A recent Vectra AI report highlights a growing distrust of threat detection tools. 47% of respondents note they do not trust their tools to work the way they need them to. Moreover, 60% of SOC practitioners say security vendors flood them with pointl.....»»
How agentic AI handles the speed and volume of modern threats
In this Help Net Security interview, Lior Div, CEO at Seven AI, discusses the concept of agentic AI and its application in cybersecurity. He explains how it differs from traditional automated security systems by offering greater autonomy and decision.....»»
IoT needs more respect for its consumers, creations, and itself
Yet again, connected devices are in the news for all the wrong reasons. In October, security researchers found that robot vacuums from Chinese company, Ecovacs, can be compromised via a backdoor. In one case, hackers gained control over the device an.....»»
Early Black Friday Blink camera deals: Security cameras up to 58% off
Protect your home with security cameras and bundles from these Black Friday Blink camera deals. The discounts will not last long, so hurry with your purchase!.....»»
These Samsung phones are at risk for a big security vulnerability
Certain Samsung phones are susceptible to a new security hack that involves phones with certain chipsets. Here's are the phones and smartwatches affected......»»
Apple products show lower outage risk and strong security appeal in Kandji survey
A new survey from Kandji highlights Apple’s rapid growth in enterprise settings and its reputation for strong security. The “Apple in the Enterprise” survey gives insights from over 300 IT professionals responsible for Apple device management a.....»»
New Apple video touts M4 MacBook Pro as ‘the Pro for pros’
Apple has released a new video today highlighting the ‘pro’-focused capabilities of the new M4 MacBook Pro lineup. In it, four professionals talk through how the device has impacted their work. more….....»»
Product showcase: Shift API security left with StackHawk
With the proliferation of APIs, and the speed at which AI functionality is helping fuel innovation, a strategic approach for securing APIs is no longer a nice to have, it’s a criticality. Without a proactive approach, your APIs could become easy ta.....»»
Neon Authorize: Granular access controls at the database layer
Neon, the serverless Postgres database built for developers, launched Neon Authorize. It enables developers to manage permissions and access controls with ease. This new offering leverages Postgres RLS (Row-Level Security) – a Postgres primitive th.....»»
Taiwan battens down for Super Typhoon Kong-rey
Five-meter waves pounded Taiwan's shores Wednesday as Super Typhoon Kong-rey drew near, with forecasters expecting the storm to strengthen before hitting the island as one of the most powerful in years......»»
Seclore secures sensitive intellectual property and data in CAD files
Seclore announced the extension of its Seclore Enterprise Digital Rights Management (EDRM) capabilities to support neutral or interoperable computer-aided design (CAD) files for industries that create, manage, and share intellectual property (IP). Th.....»»
Simplifying decentralized identity systems for everyday use
In this Help Net Security interview, Carla Roncato, VP of Identity at WatchGuard Technologies, discusses how companies can balance privacy, security, and usability in digital identity systems. She emphasizes modern techniques like biometrics and pass.....»»