Category: Security

  • Tenable Security Center Delivers Focused Vulnerability Prioritization

    Tenable Security Center Delivers Focused Vulnerability Prioritization

    Tenable announced new vulnerability intelligence, risk prioritization and web application scanning features for Tenable Security Center, the world’s #1 vulnerability management solution managed on-premises. Tenable Security Center identifies, investigates and prioritizes vulnerabilities, providing customers with a risk-based view of their security and compliance posture for their on-premises environments. Equipped with Tenable Vulnerability Intelligence, organizations have…

    Read More

    //

  • Tenable Adds Patch Management to Rapidly Close Security Exposures

    Tenable Adds Patch Management to Rapidly Close Security Exposures

    Tenable, an exposure management company, announced the release of Tenable Patch Management, an autonomous patch solution built to quickly and effectively close vulnerability exposures in a unified solution. The solution’s foundation is a strategic partnership and integration with Adaptiva, a global leader in autonomous endpoint management. Vulnerability remediation remains a critical challenge as identifying, testing…

    Read More

    //

  • Media Fusion LLC partners with Heise Medien for CyberSec India Expo 2025

    Media Fusion LLC partners with Heise Medien for CyberSec India Expo 2025

    India ranks among the fastest growing global economic markets worldwide, with cyber security becoming increasingly important. To address this development, Media Fusion LLC – a Dubai and India-based tradeshow organiser – and heise medien have partnered for the “CyberSec India Expo” today. The exhibition and conference is scheduled to take place in Mumbai on 11th and 12th…

    Read More

    //

  • CyberArk and DSCI Release Report, “Orchestrating Multi-Cloud Identities – A Unified Approach to Access Management”

    CyberArk and DSCI Release Report, “Orchestrating Multi-Cloud Identities – A Unified Approach to Access Management”

    CyberArk released a report developed with the Data Security Council of India (DSCI), an industry body on data protection in India. The report titled “Orchestrating Multi-Cloud Identities – A Unified Approach to Access Management” was launched during CyberArk’s annual flagship event in Mumbai, the Impact World Tour 2024. The objective of this report is to highlight…

    Read More

    //

  • Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

    Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

    Tenable has disclosed that its Tenable Cloud Security Research team has discovered a medium-severity Server Message Block (SMB) force-authentication vulnerability that exists in all versions of Open Policy Agent (OPA) for Windows prior to v0.68.0. OPA is one of the most widely used policy engines built on open-source software. The vulnerability, tracked as CVE-2024-8260, exists…

    Read More

    //

  • Tenable Launches Data and AI Security Posture Management for Cloud

    Tenable Launches Data and AI Security Posture Management for Cloud

    Tenable announced new data security posture management (DSPM) and artificial intelligence security posture management (AI-SPM) capabilities for Tenable Cloud Security, the actionable cloud security solution. Tenable Cloud Security reduces risk to two of the biggest emerging threats by extending exposure management capabilities to cloud data and AI resources. Today’s cloud environments are more complex than…

    Read More

    //

  • Star Health Faces $68K Ransom Demand After Major Data Breach Exposes Customer Information

    Star Health Faces $68K Ransom Demand After Major Data Breach Exposes Customer Information

    India’s Star Health and Allied Insurance recently disclosed that it was targeted by a ransomware attack, resulting in a significant data breach. Following the attack, the company revealed that it had received a ransom demand of $68,000 from the hackers responsible for the leak. The breached data is believed to include sensitive customer information, raising…

    Read More

    //

  • Quantum Computing: The Next Frontier for Cybersecurity Threats

    Quantum Computing: The Next Frontier for Cybersecurity Threats

    With the rapid evolution of quantum computing, a new threat looms over the cybersecurity landscape. The concept of “harvest now, decrypt later” is becoming a reality for hackers who are collecting encrypted data today in anticipation of decrypting it using future quantum computers. This article delves into why this tactic poses a significant risk and…

    Read More

    //

  • Safeguarding AI: Addressing the Surge in Adversarial Attacks

    Safeguarding AI: Addressing the Surge in Adversarial Attacks

    Artificial Intelligence (AI) is revolutionizing various industries, but it’s also becoming a prime target for adversarial attacks. These attacks, where malicious actors manipulate AI models by feeding deceptive inputs, are increasing in frequency and sophistication. Safeguarding AI has become a challenge for organizations, particularly from adversarial attacks. The threats are evolving rapidly from subtle image…

    Read More

    //

  • HID Signo Readers Line to further meet physical access control needs

    HID Signo Readers Line to further meet physical access control needs

    HID announces the expansion of its signature line of Signo Readers to include models that meet varying customer needs – from harsh conditions and stylistic preferences to streamlined, economical requirements. As per the company release, the latest Signo models include: “Signo Readers are designed with versatility in mind to satisfy the increasing demand for customisation,”says…

    Read More

    //