In this Help Net Security interview, Sarah Pearce, Partner at Hunton Andrews Kurth, offers insights into the evolving landscape of AI legislation and its global impact. Pearce explores key principles, public participation, the future of AI laws in a world…
Category: Help Net Security
How global password practices are changing
Password health and hygiene improved globally over the past year, reducing the risk of account takeover for consumers and businesses, according to Dashlane. Password reuse remains prevalent, however, leaving user accounts particularly vulnerable to password-spraying attacks if they’re not protected…
Securing data at the intersection of the CISO and CDO
Two groups in particular play a key and critical role in ensuring data governance and security: the CISO and the CDO. CISOs are responsible for identifying and managing risks associated with data security, while CDOs are responsible for ensuring data…
The roadblocks to preventive cybersecurity success
In the last two years, the average organization’s cybersecurity program was prepared to defend preventively, or block, just 57% of the cyberattacks it encountered, according to Tenable. This means 43% of attacks launched against them are successful and must be…
The perils of over-reliance on single cloud providers
The risk associated with dependence on a particular cloud provider for multiple business capabilities is in the top five emerging risks for organizations for the second consecutive quarter, according to a survey by Gartner. Emerging risks In September 2023, Gartner…
The role of Kubernetes in modern app management
Kubernetes, often abbreviated as K8s, is an open-source container orchestration platform that has redefined the way modern applications are developed, deployed, and managed. Born out of Google’s internal container orchestration system, Kubernetes has become the de facto standard for containerized…
Week in review: Exploited Citrix Bleed vulnerability, Atlassian patches critical Confluence bug
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: AI threat landscape: Model theft and inference attacks emerge as top concerns In this Help Net Security interview, Guy Guzner, CEO at Savvy, discusses the…
Island names Matt Fairbanks as CMO and Ellen Roeckl as CCO
Island has announced the addition of Matt Fairbanks to its executive team as Chief Marketing Officer (CMO) and the appointment of Ellen Roeckl, Island’s former head of marketing, as the company’s first Chief Communications Officer (CCO). Fairbanks is tasked with…
The hidden costs of Java, and the impact of pricing changes
An overwhelming 98% of all the businesses surveyed use Java in their software applications or infrastructure, and 57% of those organizations indicate that Java is the backbone of most of their applications, according to Azul. When including Java-based frameworks, libraries…
Mainframes are around to stay, it’s time to protect them
While many organizations run their core business applications on the mainframe, IT leaders lack confidence in the effectiveness of their mainframe security compliance, signaling a need for more robust security practices, according to Rocket Software. For decades, mainframe systems have…
Ransomware attacks set to break records in 2023
Ransomware attacks continue at a record-breaking pace, with Q3 2023 global ransomware attack frequency up 11% over Q2 and 95% year-over-year (YoY), according to Corvus Insurance. In its Q2 2023 Global Ransomware Report, Corvus noted a significant resurgence in global…
Product showcase: LayerX browser security extension
The browser has become the main workspace in modern organizations. It’s where employees create and interact with data, and how they access organizational and external SaaS and web apps. That’s why the browser is extensively targeted by adversaries. They seek…
Public exposure of data breaches is becoming inevitable
Ransomware incidents rising again as criminals use data exfiltration and supply chain attacks to maximize their leverage, according to Allianz. Allianz Commercial analysis of large cyber losses shows the number of cases in which data is exfiltrated is soaring, as…
Appdome partners with JetBrains to automate delivery of secure mobile apps
Appdome has integrated its Cyber Defense Automation Platform with the CI/CD cloud-based service from JetBrains TeamCity allowing teams to automate the build, test and deployment of their mobile applications. JetBrains TeamCity is now part of the Appdome Dev2Cyber Agility Partner…
Identiv Enterphone Mobile protects users against security breaches
Identiv introduces Enterphone Mobile, a highly secure mobile application that brings real-time audio capabilities to the front end, elevating visitor management and perimeter security in residential and commercial spaces. The new mobile app is a key feature in the refreshed…
KandyKorn macOS malware lobbed at blockchain engineers
North Korean hackers are using novel MacOS malware named KandyKorn to target blockchain engineers of a cryptocurrency exchange platform. The attack By impersonating blockchain engineering community members on Discord, the attackers used social engineering techniques to make victims download a…
PagerDuty acquires Jeli to improve enterprise resilience
PagerDuty has signed a definitive agreement to acquire Jeli to transform operations with an enterprise-grade, all-in-one incident management solution. The addition of Jeli’s capabilities to the PagerDuty Operations Cloud will further strengthen its value as a system of action, going…
Microsoft launches new initiative to augment security
Nearly 22 years after Bill Gates announced a concerted Microsoft-wide push to deliver Trustworthy Computing, the company is launching the Secure Future Initiative, to boost the overall security of Microsoft’s products and its customers and users. A new Microsoft initiative…
How cybercriminals adapt and thrive amidst changing consumer trends
The email threat landscape is experiencing a profound transformation, adapting to new challenges and exploiting emerging vulnerabilities with speed and sophistication. In this Help Net Security video, Usman Choudhary, CPTO at VIPRE Security Group, discusses how cybercriminals modify their tactics…
New infosec products of the week: November 3, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Action1, Enzoic, Immuta, and Snappt. Immuta Discover identifies and classifies sensitive data Immuta Discover automatically and continuously discovers structured data in cloud data platforms. It…