Category: Help Net Security

Diligent AI enables leaders to better manage and respond to risk

Diligent announced Diligent AI, a set of artificial intelligence capabilities within the Diligent One Platform that enhance how organizations understand, anticipate and mitigate risks. Diligent AI will enable users to identify risks, safeguard data and democratize the decision-making processes, driving…

XONA raises $18 million to accelerate product development

XONA announced the close of an $18 million strategic funding round led by established cyber investor Energy Impact Partners (EIP), bringing the company’s total funding to $32 million. The funding will allow the company to enhance its OT enterprise zero-trust…

Apple announces security updates across its platforms

Apple announced new updates across its platforms that help empower users and keep them in control of their data. Private Cloud Compute extends protections of iPhone to the cloud, so that users don’t have to choose between powerful intelligence grounded…

Cloud migration expands the CISO role yet again

The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environments, the responsibilities and challenges for…

GDPR turns six: Expert discusses AI impact

The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has questioned its suitability and relevance. In this Help Net…

Security providers view compliance as a high-growth opportunity

85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the most common roadblocks to offering managed compliance, according to Apptega. That being said, the survey also…

KELA’s TPRM module identifies software supply chain risks

KELA launched the Third-Party Risk Management (TPRM) module, fully integrated into its threat intelligence platform. This new offering is specifically designed to strengthen organizational defenses by focusing on software supply chain risks. KELA’s TPRM module stands out in the market…

DataBee EntityViews accelerates zero trust architecture deployment

DataBee, from Comcast Technology Solutions, announced new capabilities in its DataBee Hive security, risk and compliance data fabric platform. DataBee EntityViews, powered by a patent-pending entity resolution technology, introduces automated detection chaining that improves threat hunting, security detection fidelity, and…

The number of known Snowflake customer data breaches is rising

LendingTree subsidiary QuoteWizard and automotive parts provider Advance Auto Parts have been revealed as victims of attackers who are trying to sell data stolen from Snowflake-hosted cloud databases. Snowflake says that their investigation is still ongoing, but continues to stand…

Radare: Open-source reverse engineering framework

Radare is an open-source UNIX-like reverse engineering framework and command-line toolset. It can be scripted, modified, and used for batch analysis. “I started the project in 2006 when I was working as a forensic analyst, and I wrote a simple…

AI’s role in accelerating vulnerability management

With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management specifically, AI is poised to have a profound impact, enhancing two key areas: Providing quicker…