Category: Help Net Security

Today’s biggest AI security challenges

98% of companies surveyed view some of their AI models as vital for business success, and 77% have experienced breaches in their AI systems over the past year, according to HiddenLayer. The report surveyed 150 IT security and data science…

Tazama: Open-source real-time fraud management

Tazama is an open-source platform focused on improving fraud management within digital payment systems. Tazama marks a substantial transformation in the approach to financial monitoring and compliance worldwide. Previously, the financial sector struggled with proprietary solutions that were both expensive…

A cybercriminal is sentenced, will it make a difference?

The darknet is home to many underground hacking forums in which cybercriminals convene, freely sharing stories, tactics, success stories and failures. Their unguarded discussions allow our team to peek into the politics and ethics behind recent adversary activities. The threat…

Check Point introduces Harmony SaaS for automated threat prevention

Check Point has introduced Harmony SaaS, which offers protection by seamlessly integrating into customers’ existing infrastructure and providing real-time threat prevention. “With the exponential rise in SaaS adoption, organizations face unprecedented challenges in maintaining robust security and regulatory compliance. Check…

Lookout introduces SSE solution for mid-market enterprises

Lookout announced an edition of the Lookout Cloud Security Platform, the Company’s Security Service Edge (SSE) solution, that specifically addresses the unique challenges and demands faced by mid-sized enterprises. This includes an automated deployment process that empowers IT security teams…

Pathlock CAC helps SAP customers comply with regulations

Pathlock intorduced its SAP application and data security product suite, Cybersecurity Application Controls (CAC). The release is part of Pathlock’s vision to help SAP customers establish a zero-risk approach to identity and application access by implementing strong controls and monitoring…