Organizations use outdated approaches to secure APIs
Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites, according to Cloudflare. The report underscores that the volume of.....»»
Organizations need to beware of "institutional parasites," study says
Organizations that fail to identify or swiftly expel "institutional parasites" risk long-term damage, academics from British and Finnish business schools have warned......»»
Concentric AI unveils employee offboarding risk monitoring and reporting module
Concentric AI announced its new employee offboarding risk monitoring and reporting module that delivers critical data detection and response capabilities to identify true risk to data and secure sensitive information when employees leave a company. C.....»»
Apple @ Work: Do your Macs need malware protection at work?
Apple @ Work is brought to you by Kolide by 1Password, the device trust solution that ensures that if a device isn’t secure, it can’t access your apps. Close the Zero Trust access gap for Okta. Learn more or watch the demo. I was recently ch.....»»
WEF Cybercrime Atlas: Researchers are creating new insights to fight cybercrime
In early 2023, the World Economic Forum (WEF) launched Cybercrime Atlas, with the intent to map the cybercriminal ecosystem by facilitating collaboration between private and public organizations. What does this collaboration look like in practice? We.....»»
Why are many businesses turning to third-party security partners?
In 2023, 71% of organizations across various industries reported that their business feels the impact of the ongoing cybersecurity skills shortage. Many companies have been forced to scale back their cybersecurity programs as they struggle to find ex.....»»
Jamf delivers new products to help organizations meet security and compliance needs with Apple devices
Today, during a live-stream event, Jamf delivered some new product announcements designed to meet the news of IT teams looking for help with security and compliance concerns as they manage their Apple fleet of Macs, iPads, iPhones, and more. more.....»»
Gurucul Data Optimizer provides control over real-time data transformation and routing
Gurucul launched Gurucul Data Optimizer, an intelligent data engine that allows organizations to optimize their data while reducing costs, typically by 40% out of the box and up to 87% with fine-tuning. A universal collector and forwarder, Gurucul Da.....»»
TufinMate accelerates network access troubleshooting
Tufin launched TufinMate, an AI assistant that helps organizations troubleshoot network access issues across hybrid and multi-vendor network environments. TufinMate automates the secure network access enablement process across the organization, allow.....»»
Cloudflare partners with Booz Allen Hamilton to guide organizations under attack
Cloudflare announced a collaboration with Booz Allen Hamilton to support enterprises under attack by providing expedited Under Attack as a Service (UAaaS) with 30-Day Rapid Response DDoS Mitigation, including continuous monitoring and protection. Und.....»»
Darktrace ActiveAI Security Platform helps organizations shift focus to proactive cyber resilience
Darktrace has introduced the Darktrace ActiveAI Security Platform. The platform includes Darktrace’s existing security products supplemented by a set of new innovations and features, including for email and operational technology (OT). The plat.....»»
Strategies for secure identity management in hybrid environments
In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. She emphasizes balancing and adopting comprehensive security controls, including clo.....»»
How exposure management elevates cyber resilience
Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset identification and understand their assets’ security posture in relation to the.....»»
Challenging the gig economy
Employee engagement among independent gig workers is an important issue facing organizations working with remote teams and individuals. A study published in the International Journal of Management Concepts and Philosophy, which looked at the connecti.....»»
Veriato introduces AI-driven predictive behavior analytics platform
Veriato released their next generation Insider Risk Management (IRM) solution. With organizations of all sizes facing a more complex cybersecurity environment, Veriato IRM delivers flexibility and scalability using the power of GenAI. Veriato’s IRM.....»»
How to remove personal information from the internet -- and why you should
Internet scammers, scorned lovers turned stalkers, greedy salespeople, and shady organizations are looking for your private information. Your online activity is a blazing beacon inviting unwanted data collection.Delete your personal info from the int.....»»
Industrial sectors embrace zero trust for enhanced security
Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments, according to Xage Security. Zero trust security implementation in industrial sectors The report analyzes the c.....»»
Cybercriminal adoption of browser fingerprinting
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browser.....»»
Trellix ZTS enables organizations to strengthen cyber resilience
Trellix announced the Trellix Zero Trust Strategy (ZTS) Solution, available immediately worldwide. Trellix ZTS is leveraging Trellix’s AI-powered XDR Platform to provide native monitoring, protection, and threat detection. The solution enables orga.....»»
Security pros are cautiously optimistic about AI
55% of organizations plan to adopt GenAI solutions within this year, signaling a substantial surge in GenAI integration, according to a Cloud Security Alliance and Google Cloud survey. The survey received 2,486 responses from IT and security professi.....»»
Team presents new path to long-term data storage based on atomic-scale defects
With the development of the internet, social media and cloud computing, the amount of data created worldwide on a daily basis is sky-rocketing. This calls for new technologies that could provide higher storage densities combined with secure long-term.....»»