
Infosec products of the month: October 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Balbix, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, ExtraHop, …

New infosec products of the week: October 18, 2024
Here’s a look at the most interesting products from the past week, featuring releases from ExtraHop, GitGuardian, Nametag, Okta, Rubrik, and Sectigo. GitGuardian Visual Studio …

Nametag Deepfake Defense blocks AI-powered impersonation threats
More than 50% of executives expect deepfake attacks to increase over the next 12 months, but only 7% report using new technologies to detect deepfakes. Meanwhile, researchers …

Shaping the future of digital identity
Digital identity refers to the unique and electronically stored representation of an individual or entity’s personal information, characteristics, and attributes. It …

Digital ID verification: Using a mobile device to prove your identity
It’s important to understand that passwords are not passports. Using biometrics, which is a great security advancement, is not the same as identity, says Leonard …

Nametag “Sign In With ID” secures user accounts with ID-based biometric authentication
Nametag launched “Sign in with ID”, a next-generation standard to safeguard user accounts with proprietary Multi-Factor Identity technology. Traditionally, people’s accounts …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility