searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Video: How to spot deep-faked candidates during interviews

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Industry news

Get our top stories in your inbox

NEXT Biometrics to provide software customization with FingerCell algorithm

August 28, 2018

NEXT Biometrics announced it has purchased a source code license for the FingerCell algorithm from Neurotechnology. The algorithm allows developers of solutions incorporating …

Entrust Datacard raises the bar for zero factor authentication

August 24, 2018

Entrust Datacard announced new capabilities for the company’s Mobile Smart Credential solution — including Bluetooth functionality which provides automated login and logout …

IDShield adds new service options to mitigate against identity theft and medical fraud

August 24, 2018

LegalShield announced that IDShield has unveiled two new services designed to help protect members from the risk of identity theft. IDShield now can reduce mail and phone …

SevOne expands SD-WAN Monitoring Solution by adding support for VMware NSX SD-WAN

August 24, 2018

SevOne announced that its SevOne SD-WAN Monitoring Solution will now support VMware NSX SD-WAN by VeloCloud. Based on the SevOne Data Platform, the SD-WAN Monitoring Solution, …

RapidRatings launches new APIs for risk management

August 24, 2018

RapidRatings announced the release of a new application programming interface (API) suite providing financial risk analysis for clients and partners that can be integrated …

ClearSky Data announces native, cloud-based backup for VMware Cloud on AWS

August 24, 2018

ClearSky Data announced its support for VMware Cloud on AWS, which delivers a scalable service that allows organizations to migrate and extend their on-premises VMware …

Code42’s data security platform reduces user downtime and costs for Windows 10 migrations

August 24, 2018

Code42 announced enhancements for Windows 10 Device Migration. Designed to help organizations reduce risks and costs related to data loss, user downtime and lost productivity, …

Trend Micro simplifies advanced threat detection and network analysis

August 24, 2018

Trend Micro introduced advanced analytics capabilities for its network security solution, Deep Discovery. Now in addition to detecting and analyzing threats on the network, …

Threat Stack announces containerized agent to enable container deployment at scale

August 24, 2018

Threat Stack announced streamlined deployment of the Threat Stack Cloud Security Platform designed to provide organizations with the ability to automate the deployment of …

Samsung’s Exynos i S111 delivers efficiency and reliability for NB-IoT devices

August 24, 2018

Samsung announced its new narrowband (NB) Internet-of-Things (IoT) solution, Exynos i S111. The new NB-IoT solution offers coverage, low-power operation, location feedback and …

Atos and Nozomi Networks team to deliver security to OT environments

August 24, 2018

Atos and Nozomi Networks announced they will work together to provide industrial enterprises real-time operational technology (OT) network visibility, data analysis and …

Trend Micro’s new program helps IoT device makers tackle risk at source

August 23, 2018

Trend Micro has reconfirmed its commitment to Internet of Things (IoT) security with a new program designed to leverage its Zero Day Initiative (ZDI) to minimize …

Posts navigation

1 … 787 788 789 790 791 792 793 794 795 … 815

Featured news

  • August 2022 Patch Tuesday forecast: Printers again?
  • Risk astute leadership: Converting intelligence into actionable controls
  • MI-X: Open source project helps you understand whether you are exploitable
eBook: Privileged Access Management for Dummies

What's new

August 2022 Patch Tuesday forecast: Printers again?

New infosec products of the week: August 5, 2022

Risk astute leadership: Converting intelligence into actionable controls

MI-X: Open source project helps you understand whether you are exploitable

Don't miss

Cyberattacks on healthcare organizations negatively impact patient care

August 2022 Patch Tuesday forecast: Printers again?

Risk astute leadership: Converting intelligence into actionable controls

MI-X: Open source project helps you understand whether you are exploitable

Phishing campaign targets Coinbase wallet holders to steal cryptocurrency in real-time

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Machine learning creates a new attack surface requiring specialized defenses
  • Browser synchronization abuse: Bookmarks as a covert data exfiltration channel
  • Ransomware gangs are hitting roadblocks, but aren’t stopping (yet)
  • Cyberattack prevention is cost-effective, so why aren’t businesses investing to protect?

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise