Category: Help Net Security

NICE Actimize Fraud Investigation combats fraud and financial crime

NICE Actimize launched AI-powered Fraud Investigations solution that facilitates end-to-end fraud management capabilities from detection to investigations. Explicitly designed to enable fraud investigations post detection, the new solution helps financial institutions save both time and money with its automated workflow…

ArmorCode unveils two modules to help reduce software-based risks

ArmorCode announced the expansion of its platform with the launch of two new modules for Penetration Testing Management and Exceptions Management. Alongside AI-powered Correlation and Remediation, these modules further advance ArmorCode’s leading platform capabilities to reduce the time, effort, and…

Discover how online fraud can impact your business

Recent reports underscore increased fraud losses driven by both old methods and new technologies. As fraudsters exploit advancements in AI and other sophisticated tools, their methods have become more difficult to combat. From AI-driven scams and sophisticated phishing attacks to…

Future-proofing cybersecurity: Why talent development is key

In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent need to upskill current employees and adopt…

65% of websites are unprotected against simple bot attacks

Companies across industries are seeing more bot-driven attacks, both basic and advanced, according to DataDome. An analysis of over 14,000 websites uncovered alarming gaps in protection against cyber fraud, particularly within consumer-centric industries. E-commerce and luxury industries are prime targets…

RightCrowd SmartAccess platform enhancements boost enterprise security

RightCrowd announced significant advancements in its product portfolio with the launch of enhanced RightCrowd SmartAccess platform, the broadest set of mobile credential capabilities with expanded partnerships with Wavelynx, HID, and Sentry, and reinforced visitor management features. These developments mark a…

Certainly: Open-source offensive security toolkit

Certainly is an open-source offensive security toolkit designed to capture extensive traffic across various network protocols in bit-flip and typosquatting scenarios. Built-in protocols: DNS, HTTP(S), IMAP(S), SMTP(S). “The reason why we created Certainly was to simplify the process of capturing…

Paid open-source maintainers spend more time on security

Paid maintainers are 55% more likely to implement critical security and maintenance practices than unpaid maintainers and are dedicating more time to implementing security practices like those included in industry standards like the OpenSSF Scorecard and the NIST Secure Software…

Offensive cyber operations are more than just attacks

In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many myths stem from a simplistic view of these operations, ranging from…