Tines unveiled AI in Tines, a unified interaction layer for agents, copilots, and MCPs, enabling organizations to operationalize enterprise AI in a governed environment. While AI adoption is accelerating, the resulting value remains inconsistent. According to IDC, 88% of AI…
Category: Help Net Security
Delinea expands identity security platform through StrongDM acquisition
Delinea has signed a definitive agreement to acquire StrongDM. Delinea’s leadership in enterprise privileged access management (PAM), combined with StrongDM’s just-in-time (JIT) runtime authorization capabilities and developer-first access model, will form a new class of identity security platform designed for…
PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
A critical vulnerability (CVE-2025-64155) in Fortinet’s FortiSIEM security platform has now been accompanied by publicly released proof-of-concept (PoC) exploit code, raising the urgency for organizations to patch immediately. About CVE-2025-64155 CVE-2025-64155 may allow unauthenticated, remote attackers to execute unauthorized code…
AWS European Sovereign Cloud puts data, operations, and oversight inside the EU
Amazon has made the AWS European Sovereign Cloud generally available to customers across the European Union, backed by a €7.8 billion investment. According to AWS, the funding will support infrastructure buildout, staffing, and long-term operations, and is expected to drive…
F5 targets AI runtime risk with new guardrails and adversarial testing tools
F5 has unveiled general availability of F5 AI Guardrails and F5 AI Red Team, two solutions that secure mission-critical enterprise AI systems. With these releases, F5 is providing a comprehensive end-to-end lifecycle approach to AI runtime security, including enhanced ability…
Bitwarden advances passkeys and credential risk controls
Bitwarden revealed continued product innovation and ecosystem maturity to advance identity security capabilities for users and enterprises. Bitwarden introduced enterprise credential risk insights and guided remediation through Bitwarden Access Intelligence, expanded passkey interoperability across browsers, devices, and operating systems, and…
Asimily extends Cisco ISE integration to turn device risk into segmentation policy
Asimily announced enhanced microsegmentation capabilities, including new support for Security Group Access Control Lists (SGACL) within Cisco Identity Services Engine (ISE). The release builds on Asimily’s longstanding ISE integration, enabling organizations to translate device intelligence and risk context into enforceable…
JumpCloud introduces AI features to govern shadow AI and autonomous agents
JumpCloud is unveiling new AI capabilities to fuel safe innovation. Organizations can leverage JumpCloud’s platform to accelerate AI adoption. They can ensure compliance and control for all types of identity, human, non-human, and autonomous agents. Generative and agentic AI workflows…
Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
Microsoft has announced a coordinated legal action in the United States and the United Kingdom to disrupt RedVDS, a global cybercrime subscription service tied to large-scale fraud losses. The effort forms part of a broader joint operation with international law…
LinkedIn wants to make verification a portable trust signal
In this Help Net Security interview, Oscar Rodriguez, VP Trust Product at LinkedIn, discusses how verification is becoming a portable trust signal across the internet. He explains how LinkedIn is extending professional identity beyond its platform to address rising AI-driven…
QR codes are getting colorful, fancy, and dangerous
QR codes have become a routine part of daily life, showing up on emails, posters, menus, invoices, and login screens. Security-savvy users have learned to treat links with caution, but QR codes still carry an assumption of safety. Researchers from…
Cybersecurity spending keeps rising, so why is business impact still hard to explain?
Cybersecurity budgets keep climbing, but many security leaders still struggle to explain what that spending delivers to the business. A new study by Expel examines that disconnect through a survey of security and finance executives at large enterprises. The research…
CISOs flag gaps in third-party risk management
Third-party cyber risk continues to concern security leaders as vendor ecosystems grow, supply chains stretch, and AI plays a larger role in business operations. A recent Panorays survey of U.S. CISOs shows rising third-party incidents and growing regulatory attention, while…
The NSA lays out the first steps for zero trust adoption
Security pros often say that zero trust sounds straightforward until they try to apply it across real systems, real users, and real data. Many organizations are still sorting out what they own, how access works, and where authority sits. That…
Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
Join former Gartner analyst Ravisha Chugh and Abnormal’s Director of Product Marketing, Lane Billings, on January 20th for an exclusive insider look at how email security vendors will be evaluated in 2026. Backed by years of analyst experience and deep…
SpyCloud launches Supply Chain Threat Protection to expose vendor identity risk
SpyCloud has released Supply Chain Threat Protection solution, an advanced layer of defense that expands identity threat protection across the extended workforce, including organizations’ entire vendor ecosystems. SpyCloud Supply Chain Threat Protection provides timely access to identity threats derived from…
Airia adds AI Governance for compliance, accountability, and control
Airia announced the launch of its AI Governance product, the third pillar of its comprehensive enterprise AI management ecosystem. The new offering joins Airia’s established AI Security and Agent Orchestration capabilities to provide enterprises with end-to-end visibility, control, and compliance…
One Identity Manager 10.0 introduces risk-based governance and ITDR capabilities
One Identity has unveiled a major upgrade to One Identity Manager, strengthening identity governance as a critical security control for modern enterprise environments. One Identity Manager 10.0 introduces security-driven capabilities for risk-based governance, identity threat detection and response (ITDR), and…
Anthropic backs Python Software Foundation security work with $1.5 million
Anthropic has signed a two-year partnership with the Python Software Foundation (PSF), committing a total of $1.5 million to support the foundation’s work, with a focus on Python ecosystem security. Anthropic’s funding will help the PSF move its security roadmap…
CISO Assistant: Open-source cybersecurity management and GRC
CISO Assistant is an open-source governance, risk, and compliance (GRC) platform designed to help security teams document risks, controls, and framework alignment in a structured system. The community edition is maintained as a self-hosted tool for organizations that want direct…