Please turn on your JavaScript for this page to function normally.
Help Net Security
Josys centralizes identity data to replace manual IT oversight with automated governance

Josys has transitioned into an autonomous identity governance platform, expanding beyond traditional SaaS management. The enhanced platform empowers IT leaders and managed …

car tire
$100 radio equipment can track cars through their tire sensors

When people consider what might track their movements, they think of smartphone apps, GPS services, or roadside cameras. The tires of a new car rarely enter that equation. …

Help Net Security
RecordPoint MCP Server standardizes and secures AI access to compliant data

RecordPoint has unveiled its model context protocol (MCP) server, giving enterprises a secure, standardized way to expose governed data to external AI agents and platforms. …

Help Net Security
ProcessUnity Risk Index delivers controls-driven vendor risk scoring for TPRM

ProcessUnity has introduced ProcessUnity Risk Index, a risk rating built specifically for third-party risk management programs, combining proprietary control intelligence with …

Help Net Security
Enigma AI enables internal trust governance to asset-to-asset communications

Enigma Networks has announced the general availability of its Internal Trust Governance platform, Enigma AI, which continuously determines and validates which communications …

CIS-Secure_by_Design
Secure by Design: Building security in at the beginning

Secure by Design is not a single tool, product, or one‑time activity. It is a holistic approach that requires security to be deliberately embedded from the very beginning, at …

Help Net Security
Cato integrates native, behavior-based auto-adaptive threat prevention into its SASE platform

Cato Networks has announced an auto-adaptive threat prevention engine within its SASE platform, enabling enterprises to proactively block advanced threats that use legitimate …

Microsoft Windows Defender
New Defender deployment tool streamlines Windows device onboarding with single executable

Microsoft’s Defender deployment tool for Windows helps administrators manage device onboarding at scale with updated progress visibility and additional controls. Onboarding …

Claude
Anthropic poaches users from rival chatbots with easier migration

The controversy over Anthropic’s negotiations with the Pentagon has driven increased interest in Claude. Negotiations between the Department of Defense and Anthropic collapsed …

Android
Android’s March 2026 security patch fixes over 100 flaws, one under targeted exploitation

The Android March 2026 security patch addresses vulnerabilities across dozens of components and includes one CVE confirmed under active exploitation. Devices running a patch …

Help Net Security
Samsung brings Digital Home Key to Samsung Wallet, extending secure access to the home

Samsung Electronics has announced the launch of Digital Home Key, a new feature within Samsung Wallet built on Aliro, a standardized smart lock access protocol that enables …

AI
AI went from assistant to autonomous actor and security never caught up

Enterprise AI deployments have shifted from pilot programs to production systems handling customer data, executing business transactions, and integrating with core …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools