November 2022

Acronis Advanced Security + EDR improves threat detection for IT teams
Acronis introduces its new product, Acronis Advanced Security + EDR for Acronis Cyber Protect Cloud. Advanced Security + EDR delivers an innovative approach to threat …

Holm Security Cloud Scanning empowers users to detect vulnerabilities across all of their assets
Holm Security has given organizations the tools needed to lower the risk of malicious attacks in the cloud with the latest addition of Cloud Scanning to its Next-Gen …

Alcatraz AI delivers autonomous access control to Europe and Middle Eastern markets
Alcatraz AI has expanded in the European and Middle Eastern markets. As demand for biometric access solutions that boost security while also simplifying the administrator and …

Medibank won’t pay the ransom for data stolen in breach
Australian health insurance provider Medibank has announced it won’t be paying the ransom to the criminal(s) who stole data of 9.7 million of its current and former …

Identity.com unveils Gateway Protocol V2 to help users protect personal identity information
Identity.com launched version-two of its next-generation Gateway Protocol to enable users at individual and enterprise levels to have far more control over sensitive personal …

Passwordless will overtake other methods to secure employee identities
Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more …

Phosphorus collaborates with Concept Data to expand its services in Europe
Phosphorus unveiled a new distributor partnership for the European market with Concept Data, an IT and cybersecurity value-added distributor. The new partnership will see the …

Does your company need secure enclaves? Five questions to ask your CISO
Some of the biggest barriers to cloud adoption are security concerns: data loss or leakage, and the associated legal and regulatory concerns with storing and processing data …

How to assess and mitigate complex supply chain risks
As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions …

Phishing threats are increasingly convincing and evasive
In this Help Net Security video, Tonia Dudley, VP, CISO at Cofense, provides a look at the various changes seen in the phishing threat landscape. Dudley talks about the impact …

Taking cybersecurity investments to the next level
Recently, the Forgepoint team announced a new alliance with global banking leader Santander to increase cyber investment worldwide, specifically in Europe, Israel, and Latin …

False sense of safety undermines good password hygiene
LastPass released findings from its fifth annual Psychology of Password report, which revealed even with cybersecurity education on the rise, password hygiene has not …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM