October 2023
Veza launches Next-Gen IGA to help enterprises reduce identity risks
Veza launched its Next-Gen IGA (Identity Governance and Administration) solution. The solution comprises the Veza Access Control Platform and new products for provisioning and …
Ashade Tech TrustPattern provides printable smartcard functions with dual authentication
Ashade Tech launched TrustPattern, a technology that facilitates storing information on any surface using image pattern recognition. The technology encodes data using advanced …
Egnyte releases Document Room to streamline the sharing of large volumes of sensitive documents
Egnyte has launched Egnyte Document Room, a new solution powered by Egnyte’s secure platform for content collaboration and governance. With Egnyte Document Rooms, Egnyte …
Blackpoint Cyber expands cloud security with Identity Response for Azure AD
Blackpoint Cyber launched a brand-new Cloud Response feature, Identity Response for Azure AD. In light of the surge in identity-based attacks, where threat actors exploit …
Pure Storage launches Pure Protect//DRaaS for enhanced enterprise operations
Pure Storage has unveiled critical new data resilience offerings, including the introduction of Pure Protect//DRaaS, a unique Disaster Recovery as a Service (DRaaS) solution, …
Critical Atlassian Confluence vulnerability exploited by state-backed threat actor
A critical flaw in Atlassian Confluence Data Center and Server (CVE-2023-22515) has been exploited by a state-backed threat actor, Microsoft’s threat analysts have …
BlackBerry and AWS introduce two UEM innovations
BlackBerry announced two major new Unified Endpoint Management (UEM) innovations – BlackBerry UEM at the edge and BlackBerry UEM for the IoT. BlackBerry UEM software is used …
Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545)
Curl v8.4.0 is out, and fixes – among other things – a high-severity SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545). Appropriate patches for some older …
15 free Microsoft 365 security training modules worth your time
Microsoft 365 is a cloud-based productivity suite. Beyond just tools like Word and Excel, it integrates productivity applications with cloud functionalities, device …
How cyber fusion is helping enterprises modernize security operations
In this Help Net Security video, Avkash Kathiriya, Sr. VP – Research and Innovation at Cyware, explains how cyber fusion is helping enterprises modernize their security …
Endpoint malware attacks decline as campaigns spread wider
In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite campaigns growing more widespread, ransomware detections are …
Cloud security and functionality: Don’t settle for just one
Cloud security is important to you, but that doesn’t mean you’re willing to trade security for functionality. You need security to work for you. Whatever cloud security …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month