Third-party cyber risk continues to concern security leaders as vendor ecosystems grow, supply chains stretch, and AI plays a larger role in business operations. A recent Panorays survey of U.S. CISOs shows rising third-party incidents and growing regulatory attention, while…
Category: Help Net Security
The NSA lays out the first steps for zero trust adoption
Security pros often say that zero trust sounds straightforward until they try to apply it across real systems, real users, and real data. Many organizations are still sorting out what they own, how access works, and where authority sits. That…
Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
Join former Gartner analyst Ravisha Chugh and Abnormal’s Director of Product Marketing, Lane Billings, on January 20th for an exclusive insider look at how email security vendors will be evaluated in 2026. Backed by years of analyst experience and deep…
SpyCloud launches Supply Chain Threat Protection to expose vendor identity risk
SpyCloud has released Supply Chain Threat Protection solution, an advanced layer of defense that expands identity threat protection across the extended workforce, including organizations’ entire vendor ecosystems. SpyCloud Supply Chain Threat Protection provides timely access to identity threats derived from…
Airia adds AI Governance for compliance, accountability, and control
Airia announced the launch of its AI Governance product, the third pillar of its comprehensive enterprise AI management ecosystem. The new offering joins Airia’s established AI Security and Agent Orchestration capabilities to provide enterprises with end-to-end visibility, control, and compliance…
One Identity Manager 10.0 introduces risk-based governance and ITDR capabilities
One Identity has unveiled a major upgrade to One Identity Manager, strengthening identity governance as a critical security control for modern enterprise environments. One Identity Manager 10.0 introduces security-driven capabilities for risk-based governance, identity threat detection and response (ITDR), and…
Anthropic backs Python Software Foundation security work with $1.5 million
Anthropic has signed a two-year partnership with the Python Software Foundation (PSF), committing a total of $1.5 million to support the foundation’s work, with a focus on Python ecosystem security. Anthropic’s funding will help the PSF move its security roadmap…
CISO Assistant: Open-source cybersecurity management and GRC
CISO Assistant is an open-source governance, risk, and compliance (GRC) platform designed to help security teams document risks, controls, and framework alignment in a structured system. The community edition is maintained as a self-hosted tool for organizations that want direct…
Scamnetic delivers fraud protection across all payment types
Scamnetic announced a new trajectory for its patented IDeveryone solution, capable of identity-proofing virtually anyone globally during a consumer or business payment. IDeveryone Payment Protection delivers extensive protection across all payment types, including push and digital payments, cryptocurrency, checks, wire…
Firmware scanning time, cost, and where teams run EMBA
Security teams that deal with connected devices often end up running long firmware scans overnight, checking progress in the morning, and trying to explain to colleagues why a single image consumed a workday of compute time. That routine sets the…
Product showcase: Orbot – Tor VPN for iOS
Orbot for iOS is a free, open-source networking tool that routes supported app traffic through the Tor network. Developed by the Guardian Project, it is intended for users who want to reduce tracking and limit network-level monitoring on iPhone and…
How AI image tools can be tricked into making political propaganda
A single image can shift public opinion faster than a long post. Text to image systems can be pushed to create misleading political visuals, even when safety filters are in place, according to a new study. The researchers examined whether…
Lumo expands its Lumo AI assistant with encrypted, project-based workspaces
Lumo is Proton’s AI assistant, built with a focus on privacy and user control. It runs on Proton’s infrastructure and is designed so conversations are not used to train models or retained beyond what is required to provide the service.…
Wine 11 brings major architectural work, synchronization changes, 600+ bug fixes
Wine, originally short for “Wine Is Not an Emulator,” is a compatibility layer that allows Windows applications to run natively on POSIX-compliant operating systems, including Linux, macOS, and BSD. Rather than running a full copy of Windows or simulating its…
Acronis Archival Storage brings compliance-ready, S3-compatible cold storage to MSPs
Acronis announced the launch of Acronis Archival Storage, a long-term, compliant, and cost-efficient data storage and protection solution designed for Managed Service Providers (MSPs) and their small-to-medium business (SMBs) customers. With Acronis Archival Storage, users can retain large amounts of…
F5 NGINXaaS for Google Cloud protects cloud-native applications
F5 launched F5 NGINXaaS for Google Cloud, a cloud-native application delivery-as-a-service solution. Developed in collaboration with Google Cloud, this offering addresses the challenges of delivering modern and containerized applications by consolidating load balancing, security, and observability into a unified solution,…
Concentric AI releases Private Scan Manager for AWS GovCloud (US)
Concentric AI announced further expansion of the Private Scan Manager functionality in its Semantic Intelligence AI and data security governance platform to include AWS GovCloud (US). Government agencies, contractors, partners, and other organizations—including those that use Microsoft 365 Government Community…
AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations
Google and its Mandiant threat intelligence unit have released AuraInspector, an open-source tool aimed at auditing data access paths in Salesforce Experience Cloud applications. The tool focuses on the Aura framework, which underpins many Salesforce user interfaces and plays a…
Noction adds automatic anomaly detection to IRP v4.3 for faster DDoS mitigation
Noction has released Noction Intelligent Routing Platform (IRP) v4.3, delivering new capabilities in automated DDoS detection, routing safety, and operational control for modern IP networks. A key highlight of IRP v4.3 is the introduction of Automatic Anomaly Detection (AAD), a…
Minimal Ubuntu Pro expands Canonical’s cloud security offerings
Canonical has released Minimal Ubuntu Pro images for use on public cloud platforms, aiming to give teams a smaller base image with a narrower software footprint. The solution is designed for organizations that want tighter control over what runs inside…