Security Software

Security | News, how-tos, features, reviews, and videos

Security visualization / simulation / modeling  >  binary locks, locked and unlocked
cloud security / data protection / encryption / security transition

First aid kit > help / fix / patch / remedy / recovery

12 steps to building a top-notch vulnerability management program

Security experts share their best advice for the essential ingredients of a solid vulnerability management program, including foundational elements to put in place, workflows to establish, who to involve, and metrics to track.

Security system alert: 'DANGER'

Five Eyes nations warn MSPs of stepped-up cybersecurity threats

The warning likely comes in response to an increase in attacks on managed service providers, through which threat actors can access their clients.

Security system alert, warning of a cyberattack.

HackerOne launches Attack Resistance Management solution to boost cyber resilience

Vulnerability coordination and bug bounty platform says its new solution addresses attack resistance gaps by blending the security expertise of ethical hackers with asset discovery, continuous assessment, and process enhancement.

4 .root cause exploits breach raining data binary psd

New attack surface management product takes full-stack aim at software supply chain threats

Data Theorem's Supply Chain Secure offers continuous runtime analysis and dynamic inventory discovery.

An abstract network of nodes or endpoints.

Syxsense launches vulnerability monitoring and remediation solution

The new solution promises to address three key elements of endpoint security – vulnerabilities, patching and compliance.

A magnifying lens exposes an exploit amid binary code.

15 most exploited vulnerabilities of 2021

Global cybersecurity advisory highlights the 15 most targeted vulnerabilities of 2021, indicating that attackers targeted exploits both old and new last year.

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

Proficio launches detection and response service to tackle identity-based threats

MDR firm claims solution is the industry’s only vendor-agnostic open XDR solution that supports identity threat detection and response.

mwc intel brian krzanich 5g drone stock image

Drones as an attack vector: Vendors need to step up

Growing commercial use and few built-in defenses make drones an attractive target for malicious actors.

radar grid / computer circuits / intrusion detection / scanning

Bitdefender enters native XDR market with new offering

GravityZone XDR promises to reduce attacker dwell time with robust detection, quick triage, and automated threat containment.

ai artificial intelligence circuit board circuitry mother board nodes computer chips

Russia’s AI setbacks will likely heighten its cyber aggression

As sanctions hamper Russia's plans for AI dominance, it might turn up its cyber activities to hamper other countries' AI efforts.

One red umbrella stands out among a mass of black umbrellas.

Who is your biggest insider threat?

Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.

Cybersecurity

Axis Security releases security service edge offering Atmos

Atmos integrates zero-trust network access (ZTNA), secure web gateway (SWG), and cloud access security broker (CASB) capabilities to deliver a full security service edge (SSE) platform designed to provide secure connectivity over...

innovation co innovation startup venn overlapping partnering iot by pettycon via pixabay

CrowdStrike and Mandiant form strategic partnership to protect organizations against cyber threats

Vendors say the partnership combines CrowdStrike’s Falcon platform with Mandiant’s breach investigation and response services offering tighter platform integrations, industry-leading intelligence, and shared expertise.

Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

Zoom’s bug bounty ROI clear as program pays $1.8 million to fix over 400 bugs

The firm’s CISO reflects on bug bounty ROI and selling the concept to senior leadership.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Best advice for responding to today's biggest cyber threats

Scary new threats don't necessarily require big changes to your security infrastructure. These simple actions can be more effective and less disruptive.

rules rulebook law compliance regulation by baloon111 getty

New insider threat: Bad business decisions that put IP at risk

The U.S. FTC forced Weight Watchers to destroy algorithms after it violated privacy laws, giving CISOs another worry over protecting intellectual property.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia-linked cyberattacks on Ukraine: A timeline

Cyber incidents are playing a central role in the Russia-Ukraine conflict. Here's how events are unfolding along with unanswered questions.

A magnifying lens examines top secret information amid binary code.

Praetorian launches ML-powered Nosey Parker secrets scanner

The machine learning-based secrets scanner has been added to the vendor’s Chariot Platform and promises faster, context-based matching.

Load More
You Might Also Like