ZeroTier has launched ZeroTier Quantum, a software-defined networking platform designed for data center–level performance and built with quantum-resistant cryptography aligned with NIST and NSA CNSA 2.0 standards. Organizations operate far beyond network boundaries, autonomous devices, machines, vehicles, agents, and infrastructure…
Category: Help Net Security
Coro automates security operations with end-to-end threat detection and response
Coro has expanded AI-driven security operations capabilities that automate the full lifecycle of threat detection and response, enabling organizations to identify, investigate, and remediate security incidents without manual intervention. The announcement builds on Coro’s intrinsic use of AI across its…
Zenity advances context-aware security for AI agents
Zenity has unveiled continuous, contextual security for AI agents, a new approach that transforms how enterprise AI systems are secured and sets the foundation for Guardian Agents. According to Gartner, “Guardian Agents represent the next evolution in AI governance, shifting…
GitHub just made it much harder to ship a vulnerable pull request
GitHub is expanding its application security capabilities with AI-powered security detections designed to identify risks earlier in the development process, with public preview planned for early Q2. The update is intended to improve code scanning, secret detection, and dependency analysis…
Cisco builds security framework for safe enterprise adoption of AI agents
Cisco has introduced solutions to address AI security issues and remove a top barrier to agent adoption. By establishing trusted identities, enforcing strict zero trust Access controls, hardening agents before deployment, enforcing guardrails at runtime, and giving SOC teams the…
RSA ID Plus Sovereign Deployment delivers full-stack identity for high-risk environments
RSA has unveiled RSA ID Plus Sovereign Deployment, a high-assurance identity solution built for organizations requiring continuous availability, data sovereignty, and resilience against advanced threats. RSA ID Plus Sovereign Deployment is the next evolution in RSA ID Plus, the identity…
GitHub leans on hybrid detection model to expand vulnerability coverage
GitHub is expanding its application security capabilities with AI-powered security detections designed to identify risks earlier in the development process, with public preview planned for early Q2. The update is intended to improve code scanning, secret detection, and dependency analysis…
Palo Alto Networks’ Prisma AIRS 3.0 closes visibility gaps in autonomous AI systems
Palo Alto Networks has advanced its AI security platform with Prisma AIRS 3.0, securing the agentic AI lifecycle and enabling enterprises to move from observation to safe autonomous execution. The shift toward an AI-powered enterprise introduces systemic security challenges, ranging…
Relyance AI’s Lyo addresses data security gaps in autonomous systems
Relyance AI has announced the commercial availability of Lyo, an autonomous data defense engineer that monitors and secures how AI agents interact with enterprise data. Lyo emerges at an inflection point for the cybersecurity industry as autonomous AI agents spread…
Hadrian unveils Nova, enabling continuous, AI-powered offensive security testing
Hadrian has announced the launch of its agentic penetration testing solution, Nova. Built as an extension of its core external exposure management platform, Nova delivers on-demand pentesting without the delays or operational disruption typical of human-led engagements. By autonomously replicating…
Measuring security performance in real-time, not once a quarter
Most organizations have invested heavily in security products over the past decade. The assumption embedded in that spending is that more tools equal better protection. Tim Nan, CEO of digiDations, says that assumption is the most persistent misconception he encounters…
Attackers are handing off access in 22 seconds, Mandiant finds
Exploits remain the leading entry point for attackers for the sixth consecutive year, according to Mandiant’s M-Trends 2026 report, which draws on more than 500,000 hours of incident response work conducted in 2025. The data shows attackers speeding up their…
Product showcase: Cross-platform and third-party endpoint patching with Action1
Keeping endpoints patched is one of the more annoying chores in IT operations. Action1 is a cloud-based autonomous endpoint management platform that addresses this challenge head-on, covering third-party apps and OS updates (Windows, macOS, and now Linux) from a single,…
Cybersecurity jobs available right now: March 24, 2026
Application Security Analyst Alignerr | USA | Remote – View job details As an Application Security Analyst, you will review and analyze application security scenarios across code, APIs, and system behavior. You will classify vulnerabilities such as authentication flaws, injection…
Quantum threats are already active and the defense response remains fragmented
Enterprises are moving toward post-quantum security at uneven speeds, and the gap between organizations that have built crypto-agility into their infrastructure and those that have adopted the label without the underlying capability is widening. Dr. Tan Teik Guan, CEO of…
The devices winning the race to get hacked in 2026
Enterprise networks keep adding connected devices, expanding the attack surface as threat actors target a wider range of systems, many of which are difficult to inventory, secure, and patch consistently. (Source: Forescout) Forescout’s 2026 Riskiest Devices research maps that shift…
Broadcom delivers XDR solution to under-resourced SOC teams
Broadcom announced Symantec CBX (Carbon Black XDR), a cloud-based platform that combines Symantec and Carbon Black technologies in one intuitive solution. CBX addresses the needs of the industry’s largest and historically underserved market: organizations that lack the resources and training…
Top must-visit companies at RSAC 2026
RSAC 2026 Conference is taking place at the Moscone Center in San Francisco March 23 – 26. With hundreds of booths, countless product demos, and nonstop buzz, navigating RSAC can be overwhelming. That’s why we’ve done the legwork to highlight…
New device categories enter top enterprise risk rankings
Enterprise networks keep adding connected devices, expanding the attack surface as threat actors target a wider range of systems, many of which are difficult to inventory, secure, and patch consistently. (Source: Forescout) Forescout’s 2026 Riskiest Devices research maps that shift…
Apiiro introduces AI Threat Modeling to identify risks before code exists
Apiiro has announced AI Threat Modeling, a new capability within Apiiro Guardian Agent that automatically generates architecture-aware threat models to identify security and compliance risks before code exists. AI Threat Modeling allows enterprises to prevent risks at the speed of…