Abnormal Security is expanding its Account Takeover Protection product line beyond email to provide visibility into cross-platform user behavior and centralize compromised account detection and remediation across identity, collaboration, and cloud infrastructure applications. In addition, the company is launching AI…
Category: Help Net Security
Dynatrace enhances its platform with new Kubernetes Security Posture Management capabilities
Dynatrace is enhancing its platform with new Kubernetes Security Posture Management (KSPM) capabilities for observability-driven security, configuration, and compliance monitoring. This announcement follows the rapid integration of Runecast technology into the Dynatrace platform following the company’s successful acquisition earlier this…
Akamai to acquire Noname for $450 million
Akamai Technologies has announced that it has entered into a definitive agreement to acquire application programming interface (API) security company, Noname Security. Noname, one of the top API security vendors in the market, will enhance Akamai’s existing API Security solution…
Ransomware operations are becoming less profitable
As the number of real (and fake) victims of ransomware gangs continues to rise, the number of ransomware payments is falling, along with the average ransom payment. The reasons behind this decrease are many: increased cyber resilience of organizations (which…
Vectra AI Platform enhancements combat GenAI attacks
Vectra AI announced an expansion of the Vectra AI Platform to protect enterprises from new threat vectors introduced by the rapid adoption of GenAI tools. The Vectra AI Platform’s patented Attack Signal Intelligence uses behavior-based AI to defend against cyber…
BigID introduces dual-scanning capabilities for cloud native workloads
BigID has introduced a new advancement in cloud data security, privacy, and governance with the launch of its dual-scanning technology. BigID’s dual, or “hybrid”, scanning technology gives organizations speed, efficiency, and flexibility by combining side-scanning and direct scanning techniques to…
Cranium AI Exposure Management Solution helps organizations secure internal and third-party AI systems
Cranium has launched Cranium AI Exposure Management, the exposure management solution to help organizations protect and secure internal and third-party AI solutions. The Cranium Platform features an AI-augmented workflow with a secure LLM architecture paired with proprietary threat intelligence to…
Datadog Event Management helps teams reduce alert fatigue
Datadog released IT Event Management to its suite of AIOps capabilities. With Event Management, Datadog intelligently consolidates, correlates and enriches all alert events and important signals from Datadog and existing third-party observability tools into one consistent view. This process reduces…
Elastic’s Search AI to transform SOCs with AI-driven SIEM solutions
Elastic has announced that Search AI will replace the traditional SIEM with an AI-driven security analytics solution for the modern SOC. Powered by the Search AI platform, Elastic Security is replacing largely manual processes for configuration, investigation and response by…
Sumo Logic’s analytics capabilities allow security teams to find insights within their data
Sumo Logic announced new AI and security analytics capabilities that allow security and development teams to align around a single source of truth and collect and act on data insights more quickly. These advancements, bolstered by Sumo Logic’s free data…
Forescout AI enables security leaders to make confident, informed decisions
Forescout introduced its AI product strategy built to help business leaders and security operators synthesize connected device threats and make decisions with clarity and confidence. “Many cybersecurity vendors have flooded the market with solutions that apply generative AI capabilities to…
Code42 unveils source code exfiltration detection and protection capabilities
Code42 has advanced its Incydr data protection product with new capabilities to see and stop source code leak and theft and ensure organizations can prevent potential breaches, without burdening developers or security analysts. Source code is the most important intellectual…
Trellix Database Security protects sensitive data
Trellix announced an enhanced Trellix Database Security, available immediately. Trellix Database Security strengthens customers’ overall security posture by protecting sensitive data in leading database types, including legacy databases, from advanced threats while supporting compliance initiatives. “Data can be an organization’s…
Arctic Wolf Cyber Resilience Assessment helps organizations advance business resilience
Arctic Wolf released the Arctic Wolf Cyber Resilience Assessment, a risk assessment tool designed to help businesses of almost any size advance their cyber resilience and improve insurability by effectively mapping their security posture against industry-standard frameworks. The release of…
Cybercrime stats you can’t ignore
In this article, you will find excerpts from various reports that offer stats and insights about the current cybercrime landscape. Behavioral patterns of ransomware groups are changing GuidePoint Security | GRIT Q1 2024 Ransomware Report | April 2024 Q1 2024…
6 tips to implement security gamification effectively
There’s not a CISO in the industry who’s not aware of the extremely short median CISO tenure. That’s why the best CISOs are those who constantly seek ways to strengthen their teams. They help members evolve and grow in their…
The strategic advantages of targeted threat intelligence
In this Help Net Security video, Gabi Reish, Chief Business Development and Product Officer at Cybersixgill, discusses the role of threat intelligence in every enterprise’s security stack. Threat intelligence plays a significant role in proactively managing a company’s threat exposure.…
Ransomware activity is back on track despite law enforcement efforts
Despite significant disruptions for high-profile ransomware gangs LockBit and BlackCat, Q1 2024 became the most active first quarter ever recorded — a 21% increase over Q1 2023, according to Corvus Insurance. In January, Corvus reported that global ransomware attacks in…
Only 45% of organizations use MFA to protect against fraud
Most businesses struggle with identity verification and have concerns over ability to protect against AI, according to Ping Identity. Despite stronger protection solutions available, many organizations aren’t taking full advantage. The report, based on responses from 700 IT decision-makers across…
Swimlane Marketplace simplifies automation for security teams
Swimlane announced the Swimlane Marketplace, a full-stack modular marketplace for security automation. The Swimlane Marketplace goes beyond the typical marketplace by facilitating seamless integration and simplifying automation, empowering organizations to streamline security operations (SecOps) across any technology stack or use…