Please turn on your JavaScript for this page to function normally.
Infosec products of the week
New infosec products of the week: September 13, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Druva, Huntress, Ketch, LOKKER, Tenable, Trellix, and Wing Security. Tenable AI …

VirtualBox
VirtualBox 7.1: This is a major update, here’s what’s new

VirtualBox is a full virtualizer for x86 hardware designed for servers, desktops, and embedded systems. VirtualBox 7.1 introduces an enhanced user interface, cloud VM …

AI
Benefits and best practices of leveraging AI for cybersecurity

AI has become a key player in protecting valuable organizational insights from threats. Thanks to AI-enabled data protection practices such as behavior monitoring, enterprises …

visualization
Internal disconnects vs. cybersecurity: How connectivity shapes challenges

Concerns about the trustworthiness of internal data exist in nearly all organizations globally, according to TeamViewer. 99% of business leaders pointed to factors undermining …

Kali Linux 2024.3
Kali Linux 2024.3 released: 11 new tools, Qualcomm Snapdragon SDM845 SoC support

Kali Linux 2024.3 is now available for download. Besides the new tools, this release mainly focuses on behind-the-scenes updates and optimization. New tools in Kali Linux …

hospital
Cybersecurity is a fundamental component of patient care and safety

Healthcare institutions are custodians of vast repositories of sensitive patient data, encompassing comprehensive health histories, insurance profiles, and billing data. The …

ebook cloud migration
eBook: Keep assets secure after cloud migration

Organizations sometimes need to plan their cloud migrations with more emphasis on security and compliance. Many, therefore, struggle to keep their data safe after migrating to …

database
Tech stack uniformity has become a systemic vulnerability

Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability and tendency to disrupt the organization’s day-to-day …

open-source cybersecurity tools
33 open-source cybersecurity solutions you didn’t know you needed

Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security needs. These tools make …

large language models
AI cybersecurity needs to be as multi-layered as the system it’s protecting

Cybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make it possible to upload documents with hidden …

video phishing
Phishing in focus: Disinformation, election and identity fraud

The frequency of phishing attacks is rising as attackers increasingly utilize AI to execute more scams than ever before. In this Help Net Security video, Abhilash Garimella, …

cybersecurity budget
End of an era: Security budget growth slows down

Amidst global economic and geopolitical uncertainty, markets are jittery, companies are spending frugally, and investors remain cautious, according to IANS Research and Artico …

Cybersecurity news