Advertisements


Securing against GenAI weaponization

In this Help Net Security video, Aaron Fulkerson, CEO of Opaque, discusses how the weaponization of generative AI (GenAI) has made existing data privacy practices (like masking, anonymization, tokenization, etc.) obsolete. Fulkerson provides recommen.....»»

Category: securitySource:  netsecurityAug 8th, 2024

Now is the time to focus on software supply chain security improvements

The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with securing software supply chains infinitely more complex, according to recen.....»»

Category: securitySource:  netsecurityRelated NewsAug 1st, 2022

Ivanti Neurons for Digital Experience helps IT teams to improve their digital employee experience

Ivanti released Ivanti Neurons for Digital Experience which helps IT teams to better understand, measure and improve their digital employee experience. With this release, Ivanti continues to deliver on its mission of enabling and securing the Everywh.....»»

Category: securitySource:  netsecurityRelated NewsJul 27th, 2022

The current state of zero-trust cloud security

A new survey indicates there are many motivators for cloud transformation, but orgs still face barriers in securing cloud environments. A new survey indicates there are many motivators for cloud transformation, but orgs still face barriers in sec.....»»

Category: topSource:  venturebeatRelated NewsJul 20th, 2022

Push Security raises $4 million to introduce user-centric approach to securing SaaS

Push Security announced it completed a $4 million seed round led by Decibel and backed by prominent industry leaders, including Jon Oberheide, co-founder of Duo Security, and Haroon Meer, CEO and founder of Thinkst. With this funding, Push will conti.....»»

Category: securitySource:  netsecurityRelated NewsJul 19th, 2022

Building a business case for zero-trust, multicloud security

Building a business case for securing multicloud configurations needs to surpass the costs and benefits, while recognizing that public clouds lack advanced zero-trust features and unified reporting. Building a business case for securing multiclou.....»»

Category: topSource:  venturebeatRelated NewsJul 19th, 2022

Apple @ Work: Managed Device Attestation is Apple’s rethinking of securing access to critical resources

Apple @ Work is brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that fully integrates 5 different applications on a single Apple-only platform, allowing Businesses and Schools to easily and automatically deploy.....»»

Category: topSource:  marketingvoxRelated NewsJul 16th, 2022

Deloitte Zero Trust Access protects sensitive enterprise data

To help organizations adopt zero trust more quickly and efficiently, Deloitte is launching a new managed service – Zero Trust Access— that offers a cloud-native approach to securing communications between users, on any device, and enterprise appl.....»»

Category: securitySource:  netsecurityRelated NewsJul 13th, 2022

A look at the bring your own browser (BYOB) approach

Recently, Microsoft retired IE 11 in favor of Microsoft Edge, which claims to be more secure than Google Chrome, with built-in defenses against phishing and malware. Does this mean security teams have one less application to worry about securing? The.....»»

Category: securitySource:  netsecurityRelated NewsJul 12th, 2022

Properly securing APIs is becoming increasingly urgent

Imperva released a new study that uncovers the rising global costs of vulnerable or insecure APIs. The analysis of nearly 117,000 unique cybersecurity incidents estimates that API insecurity results in $41-$75 billion of losses annually. The study, c.....»»

Category: securitySource:  netsecurityRelated NewsJun 28th, 2022

Mark Zuckerberg is More Interested in the Metaverse Than Election Integrity

Mark Zuckerberg's intense focus on the metaverse has replaced securing elections as the Meta CEO's top concern, four Meta employees with knowledge of the situation told The New York Times. From a report: Zuckerberg has been public with his desire to.....»»

Category: topSource:  slashdotRelated NewsJun 24th, 2022

NSA Shares Tips On Securing Windows Devices With PowerShell

An anonymous reader quotes a report from BleepingComputer: The National Security Agency (NSA) and cybersecurity partner agencies issued an advisory today recommending system administrators to use PowerShell to prevent and detect malicious activity on.....»»

Category: topSource:  slashdotRelated NewsJun 24th, 2022

GitGuardian announces new features to help developers reduce risks of exposure

GitGuardian announced a series of new features to address developer experience in securing the software development lifecycle. To reduce the risks of exposure of secrets in the software development lifecycle, GitGuardian is betting on what it has fra.....»»

Category: securitySource:  netsecurityRelated NewsJun 23rd, 2022

Grid could use a jolt from lawmakers in preparation for EV influx, report says

Lawmakers must press for a more reliable and resilient electric grid to support electric vehicles, according to a new report from Securing America's Future Energy and the Electrification Coalition......»»

Category: topSource:  autonewsRelated NewsJun 20th, 2022

Nearly one-third of adolescents do not feel safe at school

A large international study found that on average 31.4% of adolescents reported feeling unsafe at school in 13 European and Asian countries. The result revealed inequality in securing a safe educational environment for students across countries......»»

Category: topSource:  physorgRelated NewsJun 6th, 2022

Redstor helps MSPs implement zero-trust policies with new software updates

Redstor unveiled significant updates to its software. The enhancements are designed to help managed service providers (MSPs) and their customers better tackle the modern challenges of securing remote workers, hybrid cloud environments and malware thr.....»»

Category: securitySource:  netsecurityRelated NewsJun 3rd, 2022

Entrust CloudControl 6.5 improves enterprise security and control for multi-cloud deployments

Entrust is addressing the increasing complexities of securing multi-cloud environments with the launch of Entrust CloudControl 6.5 software, which enables organizations to automate both enterprise security policy and deployment workflows for containe.....»»

Category: securitySource:  netsecurityRelated NewsMay 27th, 2022

Europe"s Historic Clean Energy Plan Faces a Mining Problem

Securing the needed minerals and metals could be a stumbling block to reaching its ambitious goals -- Read more on ScientificAmerican.com.....»»

Category: scienceSource:  sciamRelated NewsMay 24th, 2022

Google Will Start Distributing a Security-Vetted Collection of Open-Source Software Libraries

Google announced a new initiative Tuesday aimed at securing the open-source software supply chain by curating and distributing a security-vetted collection of open-source packages to Google Cloud customers. From a report: The new service, branded Ass.....»»

Category: topSource:  slashdotRelated NewsMay 17th, 2022

White House Joins OpenSSF, Linux Foundation In Securing Open-Source Software

An anonymous reader quotes a report from ZDNet: Securing the open-source software supply chain is a huge deal. Last year, the Biden administration issued an executive order to improve software supply chain security. This came after the Colonial Pipel.....»»

Category: topSource:  slashdotRelated NewsMay 14th, 2022

Goldman Sachs exec behind the Apple Card leaves the company

A Goldman Sachs executive credited for his work securing the Apple Card deal has left the company. Scott Young, chief commercial officer of Goldman’s Marcus business, will be joining fintech startup iCreditWorks next month. more… The post Gold.....»»

Category: topSource:  informationweekRelated NewsMay 13th, 2022