Please turn on your JavaScript for this page to function normally.
Infosec products of the month
Infosec products of the month: September 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute, anecdotes, ArmorCode, Binarly, Bitdefender, Druva, F5 Networks, Gcore, …

large language models
Could APIs be the undoing of AI?

Application programming interfaces (APIs) are essential to how generative AI (GenAI) functions with agents (e.g., calling upon them for data). But the combination of API and …

SCCMSecrets
SCCMSecrets: Open-source SCCM policies exploitation tool

SCCMSecrets is an open-source tool that exploits SCCM policies, offering more than just NAA credential extraction. SCCM policies are a key target for attackers in Active …

video open-source security
Open source maintainers: Key to software health and security

Open source has become the foundation of modern application development, with up to 98% of applications incorporating open-source components and open-source code accounting …

passwords
The most common authentication method is also the least secure

Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and …

cybersecurity week in review
Week in review: Windows Server 2025 gets hotpatching option, PoC for SolarWinds WHD flaw released

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Windows Server 2025 gets hotpatching option, without reboots Organizations …

IoT
3 tips for securing IoT devices in a connected world

IoT devices have become integral to how many organizations operate. From Smart TVs in conference rooms to connected sensors and wireless security cameras, these connected …

Infosec products of the week
New infosec products of the week: September 27, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Absolute, ArmorCode, Bitdefender, Guardsquare, Malwarebytes, NETGEAR, and Nudge …

cloud
New MIT protocol protects sensitive data during cloud-based computation

Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often …

AI
AI use: 3 essential questions every CISO must ask

In July, Wall Street experienced its worst day since 2022, with the tech-focused Nasdaq falling by 3.6%. The downturn was largely triggered by what commentators suggest is the …

eyes
Rethinking privacy: A tech expert’s perspective

Data privacy has become one of the most pressing challenges of our time, but it didn’t happen overnight. The proliferation of data collection, coupled with the rise of …

cyber threat
Companies mentioned on the dark web at higher risk for cyber attacks

The presence of any data relating to an organization on the dark web demonstrably increases its risk of a cyber attack, according to Searchlight Cyber. Dark web insights and …

Don't miss

Cybersecurity news