Top

Category: Security


Cloud security, Security

Skyhigh Security collaborates with Gotara to increase diversity in the cybersecurity sector

July 1, 2022

Via: Help Net Security

Skyhigh Security announced it has partnered with Gotara, a global career growth platform for women in STEM+. The program launched internally to Skyhigh Security employees this month and is a key element of the company’s leadership development program. Through the […]


Network security, Security, Threats & Malware, Virus & Malware

NXM Autonomous Security platform protects space infrastructure and IoT devices from cyberattacks

July 1, 2022

Via: Help Net Security

NXM Labs unveiled its NXM Autonomous Security platform that prevents hackers from gaining unauthorized access to commercial, industrial, medical, or consumer internet of things (IoT) devices. Tested in collaboration with the Jet Propulsion Laboratory (JPL), California Institute of Technology (Caltech), […]


Network security, Security

Infosec products of the month: June 2022

July 1, 2022

Via: Help Net Security

Here’s a look at the most interesting products from the past month, featuring releases from: Acronis, Arcserve, Black Kite, Cavelo, Code42, ComplyCube, Cynet, Elastic, ESET, Feroot, Fusion Risk Management, G-Core Labs, Hillstone Networks, Incognia, Living Security, Lumu, NetWitness, Optiv Security, […]


Email security, Security, Threats & Malware, Virus & Malware

Product showcase: Group-IB Unified Risk Platform

July 1, 2022

Via: Help Net Security

The cyber threat landscape has intensified. Threat actors are organized and professionalized, with ransomware gangs outsourcing the first step of their operations to Initial Access Brokers. This alliance has proven profitable for both sides, as the illegal sale of initial […]


Access control, Security

Rafay Systems Paralus helps users achieve secure access to Kubernetes clusters

June 30, 2022

Via: Help Net Security

Rafay Systems launched a new open-source software project named Paralus to enable secure, audited access for developers, operations, SREs and CI/CD tools to remote Kubernetes (K8s) clusters. Paralus offers access management for developers, architects, and CI/CD tools to remote K8s […]


Network security, Security

Enveil ZeroReveal ML Encrypted Training enables secure usage of cross-silo data sources

June 29, 2022

Via: Help Net Security

Enveil released its new encrypted training solution, ZeroReveal ML Encrypted Training (ZMET). The enterprise-ready product extends the boundary of trusted compute by enabling encrypted federated learning and the secure usage of disparate, decentralized datasets for machine learning applications. Designed to […]


Cloud security, Security

New Vulnerability Database Catalogs Cloud Security Issues

June 28, 2022

Via: Dark Reading

Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like the one that MITRE maintains for publicly disclosed software security issues. A new community-based database […]


Privacy protection, Security

Deep fakes – a threat to truth online?

June 27, 2022

Via: Panda Security

Every now and then, a new face swap app appears that takes the internet by storm. For a couple of days, Facebook, Twitter and Instagram are taken over by selfies that have been digitally altered to show us as older, […]


Privacy protection, Security

Exclusive: Privacy experts warn the end of cookie consent pop-ups will come at a cost

June 24, 2022

Via: TechRadar

Multiple data privacy advocates have criticised plans in the UK to replace cookie consent pop-ups with an “opt-out model”, which they believe will do more damage than good. In an email exchange with TechRadar Pro, Jon Callas of the Electronic […]


Network security, Security

Biden Signs Two Cybersecurity Bills Into Law

June 23, 2022

Via: Security Week

The Federal Rotational Cyber Workforce Program Act, which has been around since 2018, proposes a program under which certain federal employees can be temporarily moved to other agencies in an effort to boost their skills. Agencies can determine whether a […]