searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Twilio

Get our top stories in your inbox

Valimail Amplify enables mailbox providers to display logos next to authenticated email messages

July 13, 2021

Valimail announces general availability of Amplify, giving clients the ability to display their logo alongside authenticated email messages. Furthermore, the company’s …

How do I select a big data solution for my business?

June 28, 2021

Since big data consists of structured and unstructured data which is constantly growing in size, common software doesn’t have the ability to process and manage it. …

Twilio expands IoT portfolio by offering Super SIM for eSIM/eUICC devices

May 27, 2021

Twilio announced an expansion of the company’s IoT portfolio by offering Super SIM, the cellular IoT connectivity platform, as an eSIM Consumer Profile for eUICC-enabled IoT …

SnapLogic adds API management and anomaly detection capabilities

May 13, 2021

SnapLogic announced new features and enhancements that boost user productivity and improve platform performance and reliability, helping technical and non-technical …

Syniverse partners with Twilio to accelerate innovation in mobile communications

March 3, 2021

Syniverse and Twilio announced that they have entered into a partnership to accelerate the next wave of innovation in mobile communications and drive long-term growth. …

Twilio launches Microvisor, an IoT connectivity and device management platform

October 2, 2020

Twilio announced a major expansion of the company’s IoT offerings with the launch of Microvisor, an IoT connectivity and device management platform that offers embedded …

Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK

July 23, 2020

Twilio has confirmed that, for 8 or so hours on July 19, a malicious version of their TaskRouter JS SDK was being served from one of their AWS S3 buckets. “Due to a …

How do I select a DMARC solution for my business?

July 22, 2020

Domain-based Message Authentication, Reporting & Conformance (DMARC), is an email authentication, policy, and reporting protocol. It builds on the SPF and DKIM protocols …

Digital transformation: Affected and accelerated by COVID-19

July 21, 2020

97% of enterprise decision makers believe COVID-19 accelerated their company’s digital transformation efforts, according to a Twilio survey of over 2,500 enterprise decision …

Twilio partners with Microsoft Azure and adds a new feature for its IoT SIMs

May 8, 2019

Twilio, the leading cloud communications platform, announced Trust Onboard, a feature for its IoT SIMs that enables developers to identify and authenticate cellular connected …

Eavesdropper vulnerability exposes sensitive corporate communications data

November 10, 2017

Appthority published research on its discovery of the Eavesdropper vulnerability, caused by developers carelessly hard coding their credentials in mobile applications that use …

Posts navigation

1 2

Featured news

  • Overcoming obstacles to introduce zero-trust security in established systems
  • Leveraging network automation to enhance network security
  • Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)
Guide: Aligning your security program with the NIST CSF

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

Overcoming obstacles to introduce zero-trust security in established systems

Leveraging network automation to enhance network security

Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)

3CX customers targeted via trojanized desktop app

The rise of biometrics and decentralized identity is a game-changer for identity verification

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us