CTG has announced the launch of a cyber resilience scoring dashboard that helps organizations quantify risk, prioritize remediation, and track measurable improvement over time. The dashboard is part of the Group’s Cegeka Security Advisory Framework (CSAF), a modular approach that…
Category: Help Net Security
XM Cyber advances AI security with enhanced exposure and attack path visibility
XM Cyber has enhanced its Continuous Exposure Management Platform to help organizations adopt AI without exposing themselves to new and emerging threats. The release introduces three major capabilities that enable organizations to embrace AI-driven innovation at full speed, without giving…
Xona Systems brings real-time threat response to OT remote access sessions
Xona Systems has introduced Active Defense, a new capability that enables organizations to stop threats during live remote access sessions in operational technology (OT) environments automatically, without waiting for manual intervention. In many environments, the gap between detecting suspicious activity…
SCW Trust Agent: AI tracks AI influence in code to reduce software risk
Secure Code Warrior has announced SCW Trust Agent: AI, a governance solution designed to make AI influence in software development visible, attributable, and enforceable at the point of commit, enabling enterprises to scale AI coding tools with measurable control over…
Huntress adds tools to its Agentic Security Platform to detect, fix, and prevent endpoint and identity risks
Huntress has announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), expanding its Agentic Security Platform to deliver end-to-end protection across endpoints, identities, and human risk. Huntress built Managed ESPM from the ground up and…
Pindrop Fraud Assist uses AI to analyze calls and strengthen fraud prevention
Pindrop has announced Pindrop Protect Fraud Assist, the agentic fraud investigation and case management solution for real-time phone conversations. As AI fraud attacks surge across contact centers, Pindrop Protect Fraud Assist embeds agentic AI directly into the fraud investigation workflow,…
SailPoint improves visibility and control over unauthorized AI use
SailPoint has announced the launch of SailPoint Shadow AI Remediation, the latest component of its real-time AI governance and security framework. This solution enables organizations to discover, monitor, and secure the use of unauthorized AI tools, known as “shadow AI,”…
New Kingston IronKey USB drive delivers enterprise-grade data security
Kingston Digital has announced the launch of the next-generation IronKey Locker+ 50 G2 (LP50 G2) hardware-encrypted USB flash drive. The drive provides enterprise-grade security with FIPS 197 and AES 256-bit hardware encryption in XTS mode. It also safeguards against BadUSB…
Kore.ai debuts Agent Management Platform to govern enterprise AI ecosystems
Kore.ai has announced the launch of its Agent Management Platform, a unified command center designed to govern, monitor, and manage AI agents and AI systems across the enterprise. As organizations deploy AI and multi-agent systems, many are encountering “AI sprawl,”…
Intel 471 debuts integrated platform for external threat management
Intel 471 has announced its latest product offering, the Cyber Threat Exposure Bundle, on its Verity471 platform. This new bundle combines Attack Surface Exposure, Third-Party Exposure, and Brand Exposure into a single solution, providing users with a standardized view to…
EU sanctions Chinese company behind 65,000-device hack
The EU Council has sanctioned companies from China and Iran, along with two individuals, over cyberattacks targeting its member states and partners. “Those listed are subject to an asset freeze, while EU citizens and companies are prohibited from providing them…
Chainguard locks down CI/CD with secure-by-default actions
Chainguard has announced Chainguard Actions, secure-by-default workflows for CI/CD pipelines that allow developers and AI agents to ship quickly without introducing software supply chain risk. Using an agentic approach, Chainguard Actions provides a continuously secured catalog of workflows maintained by…
Imprivata enhances NHS access security with passwordless controls
Imprivata has introduced new capabilities designed to help NHS organisations and UK healthcare providers meet the unique demands of the UK’s evolving compliance, cybersecurity, data protection landscape, including the Cyber Assessment Framework (CAF)-aligned Data Security and Protection Toolkit (DSPT) and…
Veritone secures AI data with automated PII removal
Veritone deploys Veritone Redact with Veritone Data Refinery (VDR) to remove personally identifiable information (PII) and sensitive data before processing, enabling AI-ready data while protecting intellectual property (IP) and data owner rights. As the scale and stakes for AI deployments…
Jozu Agent Guard targets AI agents that evade controls
Jozu has announced the launch of Jozu Agent Guard, a zero-trust AI runtime that executes agents, models, and MCP servers in secure environments with built-in policy enforcement and guardrails that cannot be disabled. As enterprises adopt AI agents, MCP servers,…
Proofpoint addresses AI threats with intent-based security
Proofpoint has announced Proofpoint AI Security, the newest security solution that combines intent-based detection, multi-surface control points, and a comprehensive implementation framework to secure how humans and AI agents use AI across the enterprise. Based on the Agent Integrity Framework,…
Microsoft zeroes in on AI-driven data risks in Fabric
New Microsoft Purview innovations for Microsoft Fabric help organizations secure data and accelerate AI adoption. The updates focus on identifying risks, preventing data oversharing, and strengthening governance and data quality across the data estate. Integration between Microsoft Purview and Microsoft…
Millions of UK firms on alert after Companies House data exposure
Companies House, the UK’s official company registry, said its WebFiling service is back online after being shut down on Friday to fix a security issue that may have exposed the personal data of millions of firms. An investigation indicates the…
Traefik Triple Gate gains parallel safety pipelines, failover routing, and AI runtime controls
Traefik Labs has announced new capabilities that extend Traefik Hub’s Triple Gate architecture (API Gateway, AI Gateway, and MCP Gateway) with deeper runtime governance across the full AI workflow, including a composable multi-vendor safety pipeline with parallel guard execution, multi-provider…
Hidden instructions in README files can make AI agents leak data
Developers rely on AI coding agents to set up projects, install dependencies, and run commands by following instructions in repository README files, which provide setup guidance for software projects. New research identifies a security risk when attackers hide malicious instructions…