Category: Help Net Security

Next DLP Secure Data Flow prevents data theft

Next DLP launched Secure Data Flow, a capability within the Reveal Platform that uses the “What, Where, Who and How” of data’s origin, movements and modifications to provide protection. Secure Data Flow overcomes the limitations and complexities of legacy Data…

Veritas Data Insight classifies and controls unstructured data

Veritas Technologies announced better choice and flexibility for customers requiring data compliance solutions. Veritas Data Insight, which allows organizations to assess and mitigate unstructured and sensitive data compliance and cyber resilience risks, is now available in a software-as-a-service (SaaS) consumption…

eBook: The Art & Science of Secure Software Development

Software security requires a creative and disciplined approach. It involves having the vision to develop secure strategy, tactics, and execution. Excelling in the discipline demands thinking through the entire software lifecycle and enforcing security as a first-thought process. The global,…

SUSE announces Liberty Linux Lite for CentOS 7

SUSE announced a new SUSE Liberty Linux offering to help protect CentOS systems from future vulnerabilities. SUSE Liberty Linux Lite for CentOS 7 is a frictionless solution that provides customers with updates and security patches for their existing CentOS system,…

Datadog App Builder helps accelerate issue remediation

Datadog launched Datadog App Builder, a low-code development tool that helps teams create self-service applications and integrate them securely into their monitoring stacks. These customized apps help accelerate issue remediation at scale by enabling both technical and business users to…

Preparing for a post-quantum future

Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This has sparked questions about the strength of soon-to-be-standardized PQC algorithms. In this Help Net…

42% plan to use API security for AI data protection

While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems companies put in place to obtain, store, and secure it are critical to…

Malware peddlers love this one social engineering trick!

Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem but also offers a way to fix it (Source: Proofpoint) Social engineering users to install…

Low code, high stakes: Addressing SQL injection

Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s. Due to various factors, they remain the third most common source of web application vulnerabilities. Reasons include human error, new…

The rise of SaaS security teams

In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge in organizations establishing dedicated SaaS security teams is driven by significant data breaches involving widely used platforms. What motivated the…

Ghidra: Open-source software reverse engineering framework

Ghidra, a cutting-edge open-source software reverse engineering (SRE) framework, is a product of the National Security Agency (NSA) Research Directorate. The framework features high-end software analysis tools, enabling users to analyze compiled code across various platforms, including Windows, macOS, and…