Top

Tag: Security


Network security, Security

Infosec products of the month: June 2022

July 1, 2022

Via: Help Net Security

Here’s a look at the most interesting products from the past month, featuring releases from: Acronis, Arcserve, Black Kite, Cavelo, Code42, ComplyCube, Cynet, Elastic, ESET, Feroot, Fusion Risk Management, G-Core Labs, Hillstone Networks, Incognia, Living Security, Lumu, NetWitness, Optiv Security, […]


Access control, Security

Rafay Systems Paralus helps users achieve secure access to Kubernetes clusters

June 30, 2022

Via: Help Net Security

Rafay Systems launched a new open-source software project named Paralus to enable secure, audited access for developers, operations, SREs and CI/CD tools to remote Kubernetes (K8s) clusters. Paralus offers access management for developers, architects, and CI/CD tools to remote K8s […]


Network security, Security

Enveil ZeroReveal ML Encrypted Training enables secure usage of cross-silo data sources

June 29, 2022

Via: Help Net Security

Enveil released its new encrypted training solution, ZeroReveal ML Encrypted Training (ZMET). The enterprise-ready product extends the boundary of trusted compute by enabling encrypted federated learning and the secure usage of disparate, decentralized datasets for machine learning applications. Designed to […]


Threats & Malware, Vulnerabilities

New UnRAR Vulnerability Could Let Attackers Hack Zimbra Webmail Servers

June 29, 2022

Via: The Hacker News

A new security vulnerability has been disclosed in RARlab’s UnRAR utility that, if successfully exploited, could permit a remote attacker to execute arbitrary code on a system that relies on the binary. The flaw, assigned the identifier CVE-2022-30333, relates to […]


Threats & Malware, Vulnerabilities

Mitre shared 2022 CWE Top 25 most dangerous software weaknesses

June 29, 2022

Via: Security Affairs

The presence of these vulnerabilities within the infrastructure of an organization could potentially expose it to a broad range of attacks. “Welcome to the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses list (CWE™ Top 25). This […]


Editorial

Top 10 Pentesting Tools Used by Security Professionals and Ethical Hackers

June 14, 2022

Via: Natalie Dunn

With cyberattacks on the rise, it’s more vital than ever for organizations to be able to test the strength of their systems. A penetration test or “pentest” is an efficient process when it comes to identifying and exploiting vulnerabilities within […]


Editorial

Why Your Business Needs A VPN

April 20, 2022

Via: Nakisani Jacobs

Today’s businesses, regardless of size, are vulnerable to hacking and data theft, which can result in significant financial loss. A virtual private network (VPN) uses advanced technology to protect your business data and keep you safe from online threats. A […]


Editorial

There is No Security Without Data Protection and No Data Protection Without Security

February 21, 2022

Via: Natalie Dunn

In the last few years, two definitions gave entrepreneurs and business managers headaches: security and data protection. There is no security without data protection and no data protection without security. Here’s why these two definitions should always go together.     Living […]


Network security, Security

Security Think Tank: How to build a human firewall

February 2, 2022

Via: Computer Weekly

The human firewall is a critical element in the ongoing – and many would say escalating – fight against cyber criminals. Building one is dependent on several elements, but it starts with a robust programme for IT security awareness training. […]


Network security, Security

How to protect a corporate Wi-Fi network

February 2, 2022

Via: Radware Blog

Initially, the use of Wi-Fi networks in companies was restricted to providing convenient Internet access at halls or conference rooms. In such an application, the performance was quite suitable and took a secondary place in an IT infrastructure. However, literally […]