Category: Help Net Security

From PKI to PQC: Devising a strategy for the transition

Quantum computers capable of breaking currently used encryption algorithms are an inevitability. And since the US, China and Europe are sprinting to win that arms race, we know that day is coming sooner rather than later. Will organizations be ready…

Review: Cyberbunker: The Criminal Underworld

Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that enabled the proliferation of dark web forums where illegal materials were bought and sold. Cyberbunker: The Criminal Underworld The documentary…

Cyber insurance predictions for 2024

In this Help Net Security video, Dara Gibson, Senior Cyber Insurance Manager at Optiv, discusses cyber insurance and what we should expect to see in 2024: Ransomware, BEC, and pixel privacy claims will remain at the forefront of cyber insurance…

The new imperative in API security strategy

Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational pillars of API security, according to Wallarm. Prioritizing AAA principles Open authentication (OAuth), single-sign on (SSO) and JSON Web Token…

AppViewX SIGN+ strengthens software supply chain security

AppViewX launched AppViewX SIGN+, a flexible and secure code signing solution that enables DevOps teams to secure their software supply chain. With multiple deployment options, including code signing as a service, AppViewX SIGN+ seamlessly integrates into DevOps processes to enable…

Tanium and ServiceNow partner for complete asset visibility

Tanium and ServiceNow partnership provides complete asset visibility by combining Tanium’s real-time endpoint data and remediation with ServiceNow IT operations and security workflows. These two platforms empower automation across the entire estate, providing customers with a complete and accurate Configuration…

LastPass simplifies access to user data and information

LastPass announced the rollout of a new vault user interface (UI) on its iOS and Android mobile applications providing all users with easier, more streamlined access to data in their vaults. These changes unify the user experience with a modernized…

Living Security collaborates with Zscaler to manage human risk

Living Security announced a new partnership and technology integration with Zscaler. Joint customers will realize the benefits of secure internet and SaaS access, secure private access, and human risk quantification, enabling them to reduce risk. The majority of cybersecurity incidents…

TrustArc’s enhancements improve AI risk management for enterprises

TrustArc announced significant enhancements across its portfolio of products within the TrustArc Privacy Management Platform designed to enable organizations to implement accountable AI data privacy governance. As AI and machine learning continue to drive innovation and reshape numerous businesses, operations,…

ThreatModeler 7.0 brings AI to threat modeling

ThreatModeler released ThreatModeler, Version 7.0, bringing several new capabilities, including ThreatModeler WingMan (AI assistant), to help streamline the threat modeling process for software security and DevOps teams. ThreatModeler 7.0 enables faster and more consistent threat modeling with features such as…

Resecurity enhances cybersecurity in the Middle East

In a significant stride towards fortifying the cybersecurity landscape in the Middle East, Resecurity introduced its Digital Identity Protection (IDP) solution. This strategic move aligns with Resecurity’s commitment to creating a safer digital society and empowering individuals and businesses in…