Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The blueprint for a highly effective EASM solution In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can…
Category: Help Net Security
Concordium Web3 ID prioritizes user privacy for both individuals and businesses
Concordium unveils Web3 ID: an edge identification platform offering age-verification capacities designed to prioritize user privacy for both individuals and businesses. Concordium’s age verification tooling works to protect minors online amidst growing global privacy concerns and explicit data-harvesting from technology…
Modernizing fraud prevention with machine learning
The number of digital transactions has skyrocketed. As consumers continue to spend and interact online, they have growing expectations for security and identity verification. As fraudsters become savvier and more opportunistic, there’s an increased need for businesses to protect customers…
Enterprises persist with outdated authentication strategies
Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations are struggling to deliver secure and user-friendly authentication. The…
New infosec products of the week: September 15, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Armis, Cisco, CTERA, Kingston Digital, Purism, and Swissbit. Librem 11 tablet sets new standard for privacy and security with Linux-based PureOS Purism introduced the new…
Cybersecurity risks dampen corporate enthusiasm for tech investments
64% of IT leaders believe that cybersecurity concerns are negatively impacting their organization’s willingness to invest in innovative tech, according to a report by HPE Aruba Networking. This is perhaps unsurprising as 91% either consider emerging tech a danger or…
Securing OTA with Harman International’s Michal Geva
The once far-off vision of remotely updating software without needing to bring it into a service center was initially designed for bug fixes and cybersecurity updates. Today, over-the-air updates (OTA) are used to activate new functionality and upgrade a vehicle–…
Generative AI lures DevOps and SecOps into risky territory
Application security leaders are more optimistic than developer leaders on generative AI, though both agree it will lead to more pervasive security vulnerabilities in software development, according to Sonatype. According to the surveyed DevOps and SecOps leaders, 97% are using…
Diligent One allows users to analyze and report disparate data from any information source
Diligent announced Diligent One, a platform that provides leadership, boards and practitioners with a single source for all their governance, risk and compliance (GRC) needs. Over the last six months Diligent has launched board and leadership reporting dashboards for ESG,…
CertiK launches SkyInsights to simplify crypto compliance and risk management
Designed to address the pressing crypto compliance and risk management demands of Web3 firms and stakeholders, SkyInsights emphasizes CertiK’s commitment to raising the standard of security and transparency across the industry. Coming at a time when the global trend of…