Topic: security

The time to migrate to quantum-safe cryptography is now

Quantum computing is no longer a dream far off in the future; it may be right around the corner. Gartner predicts that by 2029, quantum computing will advance to the point that it will render traditional cryptography unsafe.  The encryption that we currently rely on to protect data is only effective because our current classic … continue reading

GitGuardian announces new offering to help companies secure their non-human identities

GitGuardian has announced a new security solution that targets Non-Human Identities (NHI), like API keys, credentials, access tokens.  According to GitGuardian, NHIs outnumber human identities 50 to 1, and companies often end up with NHIs scattered across their codebases, CI/CD pipelines, and productivity tools. With GitGuardian NHI Governance, companies gain visibility into where these NHIs … continue reading

Tenable announces new Patch Management offering to reduce vulnerability exposures

Tenable has announced the release of a new tool to help companies more quickly close vulnerability exposures.  According to a recent survey from Tenable, only 9% of respondents believe that they are effective at vulnerability remediation, and only 11% believe their process is efficient. The process of identifying, testing, and installing remediation patches is also … continue reading

SentinelOne releases new tool to thwart shadow AI, detect AI misconfigurations

The security company SentinelOne has released a new AI security posture management (AI-SPM) tool that provides greater visibility into both the known and unknown uses of AI across an organization. “The power and benefits of generative AI are undeniable. Yet, the very tools and cloud services that simplify and accelerate GenAI adoption are simultaneously opening … continue reading

What’s new for IT professionals from Microsoft Ignite

Microsoft’s annual development and IT conference, Microsoft Ignite, kicked off this morning, with announcements ranging from the general availability of Microsoft Security Exposure Management to the Windows Resiliency Initiative.  Here is a list of some of the highlights from the event:  Microsoft Security Exposure Management  This new solution — now generally available — provides dynamic … continue reading

Microsoft launches Azure OpenAI Data Zones to give customers more flexibility over data residency

Microsoft has announced a new deployment option in Azure OpenAI that provides more flexibility and control over data privacy and residency for companies in the United States and European Union. With Azure OpenAI Data Zones, customers can process and store data within specific geographic areas without compromising performance.  According to Microsoft, Data Zones allow for … continue reading

Edera releases open source container security benchmark and runtime scanner

Edera, provider of a secure-by-design Kubernetes and AI solution, today announced the availability of Am I Isolated, an open-source container security benchmark that probes users runtime environments and tests for container isolation.  The Rust-based container runtime scanner runs as a container and detects gaps in users’ container runtime isolation. It also provides guidance to improve … continue reading

CrowdStrike to acquire Adaptive Shield

CrowdStrike has announced that it will be acquiring Adaptive Shield, a company that provides security monitoring capabilities for SaaS applications. “This acquisition will propel CrowdStrike to become the only cybersecurity vendor to provide full protection against identity-based attacks across the modern cloud ecosystem — from on-premises Active Directory to cloud-based identity providers and the growing … continue reading

Edera launches open source OpenPaX patch to improve memory safety in Linux

Container security company Edera is working to improve application-level memory safety in Linux with the release of OpenPaX, an open source kernel patch that mitigates common memory safety errors. It was initially created to benefit Edera’s own customers, but the company decided to open source it to make it available to the broader community. The … continue reading

Why your zero trust strategy will fail without automation

Zero trust is broken. Not because it’s a bad idea, but because most organizations are applying it wrong. If your security still depends on humans to approve access requests, verify identities, and respond to threats, you’re already behind. Zero trust’s core principle—trust no one, verify everything—breaks down when manual processes are too slow, error-prone, and … continue reading

Simbian’s new AI Agents enable more efficient security operations

The AI-powered IT security company Simbian has announced a set of three new AI Agents that can “work alongside security teams to enhance the intelligence, speed, and coverage of their entire security program.” SOC Agent investigates and responds to security alerts, leveraging knowledge from security experts, the company’s playbooks, and user guidance to create responses … continue reading

Having a Cyber Resiliency plan – and Cleanroom Recovery – is critical to restoring systems after malicious attacks

In today’s threat landscape, a single ransomware attack can cripple a business for weeks, underscoring the critical importance of cyber resiliency. Attacks are becoming more common and more sophisticated, leaving businesses struggling with staggering costs and devastating downtime. Here’s a concerning reality: many organizations currently believe their recovery strategies will protect them in the event … continue reading

1 2 3 27
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!