Skip to content

Tesla Sued Over Workers’ Alleged Access to Car Video Imagery “The Benefits of Eating Healthy” “Reaping the Rewards of a Healthy Diet”

Tesla vehicles have become increasingly popular for their sophisticated camera systems and other features. However, a recent lawsuit filed in federal court by Henry Yeh of San Francisco is claiming that Tesla has allowed its employees to view, share, and circulate recordings of Tesla customers in private and embarrassing situations, without their consent. The suit… 

Trustle Raises $6M Seed Funding for Access Management Tech “A Guide to Managing Stress During Difficult Times” “Tips for Coping with Stress During Challenging Situations”

Trustle, a California startup focused on cloud access management, has just scored a major win. The company has secured $6 million in venture capital seed-stage funding, led by Glasswing Ventures and supported by FUSE, Correlation Ventures, and Capital Technology Ventures. The startup, based in Walnut Creek, is working on technology to help businesses clean up… 

Spera Banks $10 Million to Tackle Identity and Access Sprawl “5 Tips for Improving Your Writing Skills” “5 Strategies to Help You Develop Your Writing Ability”

Israeli startup Spera has recently received a substantial boost of $10 million in seed funding from YL Ventures. This money will be used to develop a cutting-edge identity security posture management platform focused on detecting, prioritizing, and remedying identity-driven breaches. The platform is the brainchild of Dor Fledel and Ariel Kadyshevitch and is designed to… 

Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police “The Pros and Cons of Online Shopping” “Exploring the Benefits and Drawbacks of Shopping Online”

The UK’s National Crime Agency (NCA) has been running several fake DDoS-for-hire websites in an effort to gain insight into the cybercrime marketplace and identify individuals engaging in these illicit activities. The websites claim to offer users the ability to launch distributed denial-of-service (DDoS) attacks against a target of their choice. These services, also known… 

Webinar Tomorrow: Understanding Hidden Third-Party Identity Access Risks “How to Make Your Home More Eco-Friendly” “Creating an Eco-Friendly Home Environment”

Third-party access poses a number of risks to organizations who grant access to their sensitive data or systems. Organizations must take steps to properly manage these risks in order to protect their data and maintain the trust of their customers and partners. To better understand the potential risks, SecurityWeek and Saviynt are hosting a live… 

Vulnerability in Toyota Management Platform Provided Access to Customer Data

Vulnerability in Toyota Management Platform Provided Access to Customer Data Toyota was recently notified of a security vulnerability in its management platform that could have resulted in the unauthorized access to customers’ personal information. The vulnerability was quickly identified and rectified, but it is nonetheless concerning news for customers of the company. Toyota has released… 

Internet Access, Privacy ‘Essential for Freedom’: Proton Chief

Internet privacy company Proton has developed a unique way of anticipating attacks on democracy in countries before they even hit the headlines. By noticing a spike in demand for its virtual private network (VPN) services, Proton is able to spot when democracy and freedom are under attack. This was the case when Russia invaded Ukraine… 

Shocking Findings from the 2023 Third-Party App Access Report

As SaaS-to-SaaS app installations are on the rise, organizations are presented with a unique challenge: how to control the proliferation of applications and the resulting risk to their data. In order to better understand the scope of the problem, Adaptive Shield has released a report on the risks and realities of third-party connected apps. Here…