Skyhigh Security unveiled Skyhigh AI, an advanced suite of AI-powered capabilities within its Security Service Edge (SSE) platform designed to elevate organizations’ security posture. Skyhigh AI significantly reduces the risks associated with enterprise usage of AI applications through increased visibility,…
Category: Help Net Security
Binarly Transparency Platform 2.5 identifies critical vulnerabilities before they can be exploited
Binarly announced Binarly Transparency Platform 2.5 with several features designed to enhance software vulnerability management and improve security posture across enterprise environments. The key highlight of this release is the innovative Reachability Analysis, a feature that identifies and prioritizes vulnerabilities…
The future of automotive cybersecurity: Treating vehicles as endpoints
The automotive industry is facing many of the same cybersecurity risks and threats that successful organizations in other sectors are up against, but it’s also battling some distinct ones. In this Help Net Security interview, Josh Smith, Principal Threat Analyst…
How to gamify cybersecurity preparedness
Organizations’ preparedness and resilience against threats isn’t keeping pace with cybercriminals’ advancements. Some CEOs still believe that cybersecurity requires episodic intervention rather than ongoing attention. That isn’t the reality for many companies; cyber threat preparedness requires a concerted training effort,…
vCISO services thrive, but challenges persist
While 75% of service providers report high customer demand for vCISO functionality, a new Cynomi report reveals that only 21% are actively offering it—opening a window onto a growth area for service providers while emphasizing the growing centrality of vCISO…
Enterprise DSPM for Fortune 500 – 1touch.io is your go-to solution
In this Help Net Security video, Jesse Sedler, VP of Product at 1touch.io, provides a compelling overview of the company’s innovative data security posture management solutions. Founded in 2017 by industry veterans, 1touch.io leverages cutting-edge AI to deliver continuous monitoring…
trackd AutoPilot leverages historical patch disruption data
trackd has released a powerful rules engine that uses its patch disruption data to enable auto-patching with confidence, and based on actual data. “There’s only one reason that vulnerability management exists as a discipline in cyber security, and that’s because…
North Korean hackers’ social engineering tricks
“North Korean malicious cyber actors conducted research on a variety of targets connected to cryptocurrency exchange-traded funds (ETFs) over the last several months,” the FBI has warned through a public service announcement. This suggests that they are likely to target…
Prompt Security helps organizations monitor data shared with Microsoft 365 Copilot
Prompt Security launched a security and governance solution for Copilot for Microsoft 365, marking a significant milestone in GenAI Security for enterprise applications. As organizations rapidly adopt GenAI tools to boost productivity and innovation, the need for robust security measures…
Proofpoint launches NIST-inspired framework to tackle data loss prevention challenges
Proofpoint launched a proprietary, partner-friendly, end-to-end information protection framework, providing organizations access to expertise, industry benchmark data and proven methodology in designing, implementing and maturing data loss prevention (DLP) programs. While DLP programs and technology are undoubtedly maturing, only 38%…
Vulnerability allows Yubico security keys to be cloned
Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware security keys and modules that may allow attackers to clone the devices. But the news is not as catastrophic as it may seem at first glance. “The attacker would…
Samba 4.21 comes with upgraded security features
Samba is the standard suite of programs that enables seamless interoperability between Linux/Unix and Windows systems. Version 4.21 has been officially released. Hardening In previous versions of Samba, if a user or group name in either option could not be…
Bluetooth Channel Sounding enhances security of Bluetooth connected devices
The Bluetooth Special Interest Group (SIG), the organization that oversees Bluetooth technology, released Bluetooth Channel Sounding, a new secure, fine-ranging feature that promises to enhance the convenience, safety, and security of Bluetooth connected devices. By enabling true distance awareness in…
Protecting national interests: Balancing cybersecurity and operational realities
With cyber threats becoming increasingly sophisticated and targeting critical infrastructure, in this Help Net Security interview, David Ferbrache, managing director of Beyond Blue, discusses the current state of cybersecurity readiness and resilience. Ferbrache talks about the complexities of managing both…
OpenBAS: Open-source breach and attack simulation platform
OpenBAS is an open-source platform that enables organizations to plan, schedule, and execute crisis exercises, adversary simulations, and breach simulations. Compliant with ISO 22398 standards, OpenBAS is built as a modern web application featuring a user-centric interface and a RESTful…
Ransomware attacks escalate as critical sectors struggle to keep up
Ransomware remains a concerning cybersecurity threat, with attacks becoming more frequent, severe, and costly. Recent reports highlight alarming trends, including increased attacks on critical sectors like healthcare, education, and manufacturing. The US, leading in global ransomware incidents, faces an exceptionally…
Cybersecurity jobs available right now: September 4, 2024
Cyber Systems Operations United States Air Force | USA | On-site – View job details The United States Air Force is looking for a Cyber Systems Operations Specialist to design, install, and support systems to ensure they operate properly and…
Ping Identity strengthens security for federal agencies and government suppliers
Ping Identity announced the addition of key identity capabilities to its FedRAMP High & DoD IL5 offerings. With Ping Government Identity Cloud, federal agencies and government suppliers now have access to capabilities that enable them to boost compliance, security and…
Kara Sprague joins HackerOne as CEO
HackerOne announced that it has appointed Kara Sprague to succeed Marten Mickos as CEO. Sprague joins HackerOne at a powerful moment in its evolution, having seen 200% product growth in its pentesting and AI red teaming business and 120% growth…
Veeam Software expands protection for Microsoft 365
Veeam Software announced Veeam Backup for Microsoft 365 v8, which delivers comprehensive and flexible immutability for Microsoft 365 data. Now organizations can ensure their Microsoft 365 data is resilient employing a zero-trust, multi-layered immutable strategy, making certain backup data is…