Tines announced its first native AI features: Automatic Mode and AI Action. Customers are already experiencing a significant impact from these two new AI capabilities within the Tines platform by leveraging Large Language Models (LLMs) in a trustworthy way to…
Category: Help Net Security
Netskope introduces SaaS security enhancements to Netskope One for GenAI and SaaS collaboration
Netskope has unveiled SaaS security enhancements to Netskope One, its cloud-native platform that offers converged security and networking services to enable SASE and zero trust transformation. These new enhancements advance the platform’s Cloud Access Security Broker (CASB) module with additional…
Photos: Infosecurity Europe 2024
Infosecurity Europe is taking place at ExCel London from 4-6 June 2024. Help Net Security is on-site. This gallery takes you inside the event. The featured vendors are: Plainsea, Qualys, Akamai, Microsoft, Bridewell, Adaptive Shield, Jamf. The post Photos: Infosecurity…
Thales Passwordless 360° enables organizations to improve their identity management practices
Thales announced Passwordless 360°, a new concept for passwordless authentication which offers Thales customers the broadest coverage of passwordless function across multiple types of users and assurance levels. Passwordless 360° has the flexibility to let companies use the latest technologies…
Intel 471 launches 471 Attack Surface Protection to enhance external threat visibility
Intel 471 launched the company’s 471 Attack Surface Protection solution, an attack surface management (ASM) tool that provides its customers visibility into their external threat landscape and drives a proactive response that neutralizes threats and mitigates risk. Fueled by Intel…
TotalRecall shows how easily data collected by Windows Recall can be stolen
Ethical hacker Alexander Hagenah has created TotalRecall, a tool that demonstrates how malicious individuals could abuse Windows’ newly announced Recall feature to steal sensitive information. TotalRecall results (Source: Alexander Hagenah) Copilot+ Recall and its security pitfalls On May 20, Microsoft…
Verimatrix XTD Accessibility Abuse Detector identifies Android mobile app threats
Verimatrix introduced Verimatrix XTD Accessibility Abuse Detector service that builds upon its ongoing successful discoveries of notable Android security threats and provides much-needed GDPR protections. Verimatrix XTD and its suite of cybersecurity solutions have been helping customers identify Android mobile…
Appdome SDKProtect reduces third-party mobile supply chain risk
Appdome released a new mobile SDK protection and mobile threat streaming service, called Appdome SDKProtect. Appdome SDKProtect is designed to end third-party, mobile supply chain risk and democratize mobile threat intelligence and telemetry data among mobile SDK developers. The new…
N2WS launches cross-cloud volume restore for AWS and Azure
N2WS has introduced several new features to its cloud-native backup and disaster recovery (BDR) platform to help enterprises and managed service providers (MSPs) with combatting the increasing number of cybersecurity attacks on organizations while also ensuring data sovereignty, enhancing data…
No summer break for cybercrime: Why educational institutions need better cyber resilience
The education system isn’t equipped to handle today’s cyberthreats. I’m not just talking about cybersecurity education in schools shaping the technical workforce of the future – America’s schools themselves are prime targets for cybercrime today. In fact, according to some…
How AI-powered attacks are accelerating the shift to zero trust strategies
In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging threats like AI-generated deepfakes and…
Find out which cyber threats you should be concerned about
This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024 Human error…
Cybersecurity jobs available right now: June 5, 2024
Corporate Data Protection Manager GLS | Germany | Hybrid – View job details As a Corporate Data Protection Manager, you will develop the Corporate Data Protection Framework with a special focus on compliance with the EU General Data Protection Regulation.…
Veeam Data Cloud Vault enables users to securely store backup data
Veeam Software introduced Veeam Data Cloud Vault, a cloud-based storage service that enables users to securely store backup data not only off-site, but in an always-immutable and encrypted format, providing additional layers of protection for critical information. Enterprises can leverage…
LOKKER Consent Verification identifies potential compliance issues
LOKKER released Consent Verification, a new tool in LOKKER’s Privacy Edge Platform that gives businesses a simple way to check whether their consent banners are properly configured and working correctly. LOKKER’s recent research found that more than 90% are not.…
PoC for Progress Telerik RCE chain released (CVE-2024-4358, CVE-2024-1800)
Security researchers have published a proof-of-concept (PoC) exploit that chains together two vulnerabilities (CVE-2024-4358, CVE-2024-1800) to achieve unauthenticated remote code execution on Progress Telerik Report Servers. Telerik Report Server is a centralized enterprise platform for report creation, management, storage and…
ManageEngine unveils passwordless, phishing-resistant FIDO2 authentication
ManageEngine launched passwordless, phishing-resistant FIDO2 authentication for enterprise applications in ADSelfService Plus, its on-premises identity security solution, and the launch of endpoint MFA for Windows machines and elevated system actions in Identity360, its cloud-native identity management platform. Identity-first security: A…
SailPoint Risk Connectors helps organizations identify and act on risks
SailPoint has announced a new offering on its Atlas platform, SailPoint Risk Connectors. As part of its Atlas platform, SailPoint Risk Connectors makes it easier for organizations to make informed access decisions based on an identity’s third-party risk scores. Speed…
eBook: Breaking bad actors
There’s never been a better time to deepen your skills in cybersecurity as the demand for experienced experts continues to grow. Learn how to break today’s bad actors in the eBook. Inside the eBook: Why the need for more cybersecurity…
Wipro Cyber X-Ray empowers CXOs to make optimized security investment decisions
Wipro Wipro has partnered with Zscaler to introduce Wipro Cyber X-Ray, an AI-assisted decision support platform. Wipro Cyber X-Ray empowers enterprise CXOs to make optimized security investment decisions and communicate cyber values to senior leadership and the board. Security business…