OneLayer announced the expansion of its private cellular network security solutions to encompass the areas of operations and asset management, leveraging the same cyber-related capabilities to provide more value for additional stakeholders in the organization. Following several deployments of their…
Category: Help Net Security
Cisco to acquire Splunk in deal valued at $28 billion
Cisco and Splunk announced a definitive agreement under which Cisco intends to acquire Splunk for $157 per share in cash, representing approximately $28 billion in equity value. Upon close of the acquisition, Splunk President and CEO Gary Steele will join…
Dig enhances its platform to protect enterprise data in all storage environments
Dig has expanded the Dig Data Security Platform to protect data anywhere enterprises store sensitive information, including public cloud, software as a service (SaaS), database as a service (DBaaS) and on-premise environments. Dig’s data security posture management (DSPM) and data…
BlueVoyant Supply Chain Defense enhancements reduce issues in third-party ecosystems
BlueVoyant released new Supply Chain Defense (SCD) product offerings and services. BlueVoyant now provides a comprehensive solution to reduce cyber risk in organizations’ third-party ecosystems. BlueVoyant has added more options for continuous monitoring of vendors, a fully configurable questionnaire management…
Viavi Observer Sentry provides threat visibility into AWS environments
Viavi Solutions unveiled Observer Sentry, Software-as-a-Service-based Threat Exposure Management providing SecOps, DevOps, and cloud architects much-needed threat visibility into ever-changing AWS environments. The 2023 State of the Network study from VIAVI revealed increases in enterprises’ dependence on the cloud, dissatisfaction…
CyberArk and Accenture join forces to improve identity security for organizations
CyberArk announced that Accenture has expanded its deployment of the CyberArk Identity Security Platform to include CyberArk Privilege Cloud. The solution enables Accenture to control and monitor privileged access across on-premises, cloud and hybrid infrastructures for clients as well as…
Juniper Apstra enhancements simplify and standardize data center architectures
Juniper Networks announced new Juniper Apstra capabilities that enhance operator experiences to facilitate the deployment and operations of private data center infrastructures. With the introduction of new experience-first data center features, including simplified data collection and visualization via graph databases,…
Fake WinRAR PoC spread VenomRAT malware
An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code execution (RCE) vulnerability in WinRAR, to spread the VenomRAT malware. The fake WinRAR PoC On August 17, 2023, Trend Micro’s…
Fortress Information Security partners with NetRise to secure software supply chains
Fortress Information Security and NetRise partnered to offer a new, innovative Software Bill of Materials (SBOM) transparency solution to secure software supply chains and meet evolving regulatory requirements for software transparency. Fortress’ cybersecurity experts partner with public sector organizations and…
Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179)
Trend Micro has fixed a critical zero-day vulnerability (CVE-2023-41179) in several of its endpoint security products for enterprises that has been spotted being exploited in the wild. About CVE-2023-41179 The nature of the flaw hasn’t been revealed, but we know…
Regulatory pressure complicates cybersecurity for industrial equipment manufacturers
50% of companies lack a dedicated security function for control systems and devices within their organizational structure, according to Cybellum. Security incidents involving industrial organizations have seen a sharp rise in recent years, with notable cases highlighting the vulnerabilities in…
How companies can take control of their cybersecurity
In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets needed for teams working in this field. The interview highlights the shift from technical expertise to a focus on organizational…
How to set up and speed up Amazon S3 Replication for cross-region data replication
Amazon S3 is a simple cloud storage solution enabling effortless storage and retrieval of large amounts of data from different geographies. It’s engineered for scalability, durability, and security, making it a popular option for data storage and distribution. In addition,…
Building GenAI competence for business growth
To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance in prioritizing use cases, and identification of key stakeholders essential for building and implementing successful initiatives, according to IDC. Essential…
Hidden dangers loom for subsea cables, the invisible infrastructure of the internet
More than 97% of the world’s internet traffic passes through subsea cables at some point, according to ENISA. Subsea cables are a vital component of the global internet infrastructure, and it is critical to protect them from cyberattacks, physical attacks…
Wing Security releases SaaS protection tier for mid-market companies
Wing Security launched its new SSPM for Compliance tier, enabling midmarket companies to adopt SaaS solutions while meeting a base level of security required by compliance frameworks. Customers who are seeking a comprehensive 24×7 posture management solution can upgrade their…
NordVPN Sonar helps internet users detect phishing emails
NordVPN launched its first experimental project under the NordLabs platform. The AI-enabled browser extension Sonar aims to help internet users detect phishing emails and protect themselves from cybercrimes. “AI tools have facilitated the automation of a significant portion of phishing…
McAfee Scam Protection blocks fake emails, texts, and social media links
McAfee launched McAfee Scam Protection to address the rise in AI-generated phishing scams. The latest feature in McAfee’s product suite draws on patented AI technology to turn the tables on cybercriminals using AI to turbocharge scams and deceive people out…
1Password introduces mobile support for passkeys
1Password customers can now create, manage, and sign in with passkeys on a growing number of websites and apps, providing cross-platform access on iOS 17 and Android 14, as well as all major web browsers on Mac, Windows, and Linux.…
Akamai partners with Corero Network Security to improve DDoS protection for enterprises
Akamai announced a global partnership with Corero Network Security, the specialists in distributed denial-of-service (DDoS) protection solutions. Akamai is now offering Corero’s on-premises DDoS protection to extend Akamai Prolexic, Akamai’s own comprehensive portfolio of DDoS security solutions. DDoS attacks continue…