PRODUCTS

Cyber Security Elements by NSS

Author name: NSS NEWS

Fortra Launches Cloud Email Protection to Combat the Rise of Advanced Threats

Global cybersecurity software and services provider Fortra today introduced a transformative advancement in email security with the launch of Cloud Email Protection. This integrated cloud email security (ICES) solution sets a new standard by seamlessly blending artificial intelligence, threat intelligence, and automated remediation to stop advanced threats that elude traditional defenses and make it through to corporate […]

Fortra Launches Cloud Email Protection to Combat the Rise of Advanced Threats Read More »

BeyondTrust. Assessing PAM Tools and Your Next Step in Privileged Access Management

Identity is the new perimeter — and privileged access management (PAM) is the keystone of modern identity and access security. No identities—human or machine—are more imperative to secure than those with privileged access to systems, data, applications, and other sensitive resources. Beyond that, PAM is also essential for protecting your entire identity infrastructure, including your

BeyondTrust. Assessing PAM Tools and Your Next Step in Privileged Access Management Read More »

The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI

Generative artificial intelligence technologies such as OpenAI’s ChatGPT and DALL-E have created a great deal of disruption across much of our digital lives. Creating credible text, images and even audio, these AI tools can be used for both good and ill. That includes their application in the cybersecurity space. While Sophos AI has been working

The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI Read More »

MailStore. 5 Common Misconceptions About Email Archiving

Steady growth in email traffic has been a constant in the business world for many years, and it’s all the more surprising, therefore, that so many companies are still neglecting to protect the ever-expanding information resource that is email. Yet, securing the valuable information contained in emails can be done quickly, simply and at little

MailStore. 5 Common Misconceptions About Email Archiving Read More »

Sophos. Top 10 tips to protect your privacy and safety during the online shopping season and beyond

As the online shopping season ramps up in many parts of the world, these ten top tips will help you maintain your privacy and safety so you can shop with confidence. Use an ad blocker – Advertisements are not only tracking your every movement and collecting enough information on your habits to make the FBI

Sophos. Top 10 tips to protect your privacy and safety during the online shopping season and beyond Read More »

GlobalSign. Biometric Authentication: The Good, the Bad, and the Ugly

It may not seem like it, but humans have been using some form of biometric authentication since ancient times. For example, handprints and fingerprints have been used to sign contracts or seal deals for centuries; these can rightly be considered very early prototypes of biometric authentication. However, we have seen a boom in the use

GlobalSign. Biometric Authentication: The Good, the Bad, and the Ugly Read More »