Akeylesshas released a new AI Agent Identity Security solution designed to secure the rise of autonomous AI systems. AI Agent identity crisis More than 95% of organizations are planning to adopt and use AI agents in the next 12 months.…
Category: Help Net Security
Confluent Private Cloud enables real-time data streaming and governance for regulated industries
Confluent has released Confluent Private Cloud, the simplest way to deploy, manage, and govern streaming data on private infrastructure. The solution addresses the challenge of scaling Apache Kafka on-premises in highly regulated industries by bringing Confluent’s most advanced cloud-native features…
StrongestLayer launches AI Advisor to verify unknown senders in real time
StrongestLayer has launched AI Advisor, an inbox-native security assistant designed to verify first-time senders and unknown contacts in real time. The Outlook and Gmail plugin provides instant, AI-powered analysis for any email that raises suspicion, reimagining security awareness by replacing…
New OpenText capabilities enhance enterprise defense with AI across identity, data, and apps
OpenText announced new cybersecurity capabilities designed to help enterprises embed AI into everyday security operations and enforce governance and compliance at scale. OpenText Cybersecurity unifies defenses across identity, data, applications, SecOps, and forensics, putting AI directly in the flow of…
How neighbors could spy on smart homes
Even with strong wireless encryption, privacy in connected homes may be thinner than expected. A new study from Leipzig University shows that someone in an adjacent apartment could learn personal details about a household without breaking any encryption. By monitoring…
How the City of Toronto embeds security across governance and operations
In this Help Net Security interview, Andree Noel, Deputy CISO at City of Toronto, discusses how the municipality strengthens its cyber defense by embedding security into strategic objectives and digital governance. She outlines the City’s approach to addressing evolving threats…
Your photo could be all AI needs to clone your voice
A photo of someone’s face may be all an attacker needs to create a convincing synthetic voice. A new study from Australia’s national science agency explores this possibility, testing how well deepfake detectors perform against FOICE (Face-to-Voice), an attack attack…
Hottest cybersecurity open-source tools of the month: October 2025
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Chekov: Open-source static code analysis tool Checkov is an open-source tool designed to help teams secure their cloud infrastructure and code. At…
Email breaches are the silent killers of business growth
78% of organizations were hit by an email breach in the past 12 months, according to the Email Security Breach Report 2025 by Barracuda. Phishing, impersonation, and account takeover continue to drive incidents that often lead to ransomware and data…
SUSE Linux Enterprise Server 16 puts AI in the operating system
SUSE has released SUSE Linux Enterprise Server (SLES) 16, calling it AI-ready and built for long-term use. The release marks the first major update in the Enterprise Server line in more than five years and signals a new direction for…
ZEST Security launches free AI-based remediation risk assessment for security teams
ZEST Security announced its free remediation risk assessment. The industry is overflowing with tools to identify vulnerabilities, but these tools all fail to provide context that has real operational impact. ZEST is bridging that gap by offering curated remediation pathways…
OpenAI’s gpt-oss-safeguard enables developers to build safer AI
OpenAI is releasing a research preview of gpt-oss-safeguard, a set of open-weight reasoning models for safety classification. The models come in two sizes: gpt-oss-safeguard-120b and gpt-oss-safeguard-20b. Both are fine-tuned versions of the gpt-oss open models and available under the Apache…
Sanctions won’t stop cyberattacks, but they can still “bite”
Sanctions are one of the tools Western governments use when they want to hit back at state-sponsored cyber threat actors. But do they actually work? That’s the question a group of current and former cybersecurity officials, analysts, and researchers tackled…
Commvault introduces Data Rooms to securely connect backup data with AI platforms
Commvault introduced Data Rooms, a secure environment that enables enterprises to safely connect their trusted backup data to the AI platforms they rely on, or to their own AI initiatives, such as internal data lakes. By combining governed, self-service access…
Fortra DSPM helps organizations protect sensitive data across hybrid cloud
Fortra announced the launch of its new Data Security Posture Management (DSPM) solution to enable organizations to discover, classify, and protect sensitive data across their hybrid cloud. Fortra DSPM strengthens the company’s security portfolio by helping enterprises maintain visibility and…
Rapid7 strengthens security with AI-powered risk and vulnerability insights
Rapid7 announced AI-generated risk intelligence as part of the Rapid7 Command Platform. Delivered through Remediation Hub, the new capability accelerates remediation by giving security teams a contextual, and actionable view of each exposure, transforming vulnerability data into risk intelligence informed…
Sweet Security brings Runtime CNAPP visibility and protection to Windows environments
Sweet Security announced an extension of its Runtime CNAPP sensor to include Windows environments. With this launch, organizations can secure Windows workloads and applications in the cloud. The new capability brings the same visibility, real-time detection, risk prioritization, and automated…
Trellix unveils Helix integration with Hyperautomation to streamline SOC operations
Trellix announced Trellix Helix is now integrated with Trellix Hyperautomation, a no-code, drag-and-drop workflow builder that automates security processes. Trellix Helix provides customers with AI-powered context across all threat vectors and security tools in their environment for increased visibility, faster…
Acronis Cyber Protect Local brings unified cyber protection to cloud-restricted environments
Acronis announced the launch of Acronis Cyber Protect Local, a solution that delivers natively integrated cyber resilience for on-premises, sovereign private cloud, and air-gapped IT and OT environments. Designed for organizations where cloud deployment is not an option, the solution…
New Zscaler ZDX features strengthen zero trust and streamline performance monitoring
Zscaler unveiled new Zscaler Digital Experience (ZDX) innovations that help enterprises monitor and fix performance issues faster, achieving real-time insights across the internet and endpoint, cutting issue detection by 98%, and resolving issues in minutes to strengthen SLAs and minimize…