searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Kong

Get our top stories in your inbox

Kong Enterprise 2.7 enables companies to manage APIs and microservices at scale

February 10, 2022

Kong released Kong Enterprise 2.7, a service connectivity platform that enables companies to manage APIs and microservices at scale across any underlying architecture. This …

Approov Alliance and Integration Program offers security solutions to protect APIs

August 27, 2021

Approov introduced the Approov Alliance and Integration Program to ensure that the critical elements of comprehensive mobile app API protection are rigorously tested and work …

Venafi surpasses $100M in annual recurring revenue

April 8, 2021

Venafi announced that the company has surpassed $100 million in annual recurring revenue (ARR), cementing its leadership as category creator. This news comes on the heels of …

Kong raises $100M to scale its go-to-market operations and accelerate cloud connectivity

February 10, 2021

Kong announced it has closed $100 million in Series D funding, led by Tiger Global Management with participation from existing investors Index Ventures, CRV, GGV Capital and …

Featured news

  • Hijacking of popular ctx and phpass packages reveals open source security gaps
  • Sigstore: Signature verification for protection against supply chain attacks
  • Review: Hornetsecurity 365 Total Protection Enterprise Backup
Easily migrate to the cloud with CIS Hardened Images

What's new

New infosec products of the week: May 27, 2022

What is keeping automotive software developers up at night?

How to eliminate the weak link in public cloud-based multi-party computation

80% of consumers prefer ID verification when selecting online brands

Don't miss

How to eliminate the weak link in public cloud-based multi-party computation

GM, Zola customer accounts compromised through credential stuffing

Hijacking of popular ctx and phpass packages reveals open source security gaps

Sigstore: Signature verification for protection against supply chain attacks

Why are current cybersecurity incident response efforts failing?

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise