Diligent announced Diligent AI, a set of artificial intelligence capabilities within the Diligent One Platform that enhance how organizations understand, anticipate and mitigate risks. Diligent AI will enable users to identify risks, safeguard data and democratize the decision-making processes, driving…
Category: Help Net Security
Protecto improves data security and privacy for GenAI apps in Databricks environments
Protecto announced its latest capabilities designed to protect sensitive enterprise data, such as PII and PHI, and block toxic content, such as insults and threats within Databricks environments. This enhancement is pivotal for organizations relying on Databricks to develop the…
Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051)
JetBrains has fixed a critical vulnerability (CVE-2024-37051) that could expose users of its integrated development environments (IDEs) to GitHub access token compromise. About CVE-2024-37051 JetBrains offers IDEs for various programming languages. CVE-2024-37051 is a vulnerability in the JetBrains GitHub plugin…
XONA raises $18 million to accelerate product development
XONA announced the close of an $18 million strategic funding round led by established cyber investor Energy Impact Partners (EIP), bringing the company’s total funding to $32 million. The funding will allow the company to enhance its OT enterprise zero-trust…
Apple announces security updates across its platforms
Apple announced new updates across its platforms that help empower users and keep them in control of their data. Private Cloud Compute extends protections of iPhone to the cloud, so that users don’t have to choose between powerful intelligence grounded…
YesWeHack raises €26 million to expand its international growth
YesWeHack announces a €26 million Series C funding round. In a world where cyber risks are more strategic and complex than ever, YesWeHack will use this funding to invest in Artificial Intelligence, launch new innovative solutions and expand its international…
Cloud migration expands the CISO role yet again
The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environments, the responsibilities and challenges for…
Preparing for a career in cybersecurity? Check out these statistics
This article includes excerpts from various reports that provide statistics and insights on cybersecurity jobs, skills shortages, and workforce dynamics. Lack of skills and budget slow zero-trust implementation Entrust | 2024 State of Zero Trust & Encryption Study | May…
GDPR turns six: Expert discusses AI impact
The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has questioned its suitability and relevance. In this Help Net…
Security providers view compliance as a high-growth opportunity
85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the most common roadblocks to offering managed compliance, according to Apptega. That being said, the survey also…
KELA’s TPRM module identifies software supply chain risks
KELA launched the Third-Party Risk Management (TPRM) module, fully integrated into its threat intelligence platform. This new offering is specifically designed to strengthen organizational defenses by focusing on software supply chain risks. KELA’s TPRM module stands out in the market…
Compliance Scorecard enhances its CaaS platform to improve MSPs’ cybersecurity posture
Compliance Scorecard has unveiled the latest version of its Compliance-as-a Service (CaaS) platform. The updated platform now includes advanced risk management tools, improved asset management capabilities, and new compliance reporting methods designed to help MSPs strengthen their cybersecurity service offerings…
DataBee EntityViews accelerates zero trust architecture deployment
DataBee, from Comcast Technology Solutions, announced new capabilities in its DataBee Hive security, risk and compliance data fabric platform. DataBee EntityViews, powered by a patent-pending entity resolution technology, introduces automated detection chaining that improves threat hunting, security detection fidelity, and…
The number of known Snowflake customer data breaches is rising
LendingTree subsidiary QuoteWizard and automotive parts provider Advance Auto Parts have been revealed as victims of attackers who are trying to sell data stolen from Snowflake-hosted cloud databases. Snowflake says that their investigation is still ongoing, but continues to stand…
Entrust Citizen Identity Orchestration enhances citizen adoption of digital public services
Entrust launched Citizen Identity Orchestration solution. Governments now can streamline the delivery of public services through secure digital identities, embedding trust in every citizen interaction. The innovative and modular solution from Entrust launches as governments worldwide experience increasing demands for…
Radare: Open-source reverse engineering framework
Radare is an open-source UNIX-like reverse engineering framework and command-line toolset. It can be scripted, modified, and used for batch analysis. “I started the project in 2006 when I was working as a forensic analyst, and I wrote a simple…
AI’s role in accelerating vulnerability management
With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management specifically, AI is poised to have a profound impact, enhancing two key areas: Providing quicker…
Cybersecurity pros change strategies to combat AI-powered threats
75% of security professionals had to change their cybersecurity strategy in the last year due to the rise in AI-powered cyber threats, with 73% expressing a greater focus on prevention capabilities, according to Deep Instinct. Additionally, 97% of respondents are…
Why CISOs need to build cyber fault tolerance into their business
CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to outdated zero tolerance for failure mindsets, according to Gartner. “Each new cybersecurity disruption exposes the fact that CISOs manage more…
Protecting identity in a world of deepfakes and social engineering
In this Help Net Security video round-up, security experts discuss various aspects of identity verification and security, including generative AI’s impact, the state of identity fraud prevention, and the potential impact of identity challenges on the security sector. Complete videos…