AI and ML deserve the hype they get, but the focus can’t always be on the glitz. As these advances to deliver real benefits, there’s a slew of more mundane actions that have to be taken—and in 2024, this is…
Category: Help Net Security
Stack Identity expands its plaform with ITDR to tackle shadow access and shadow identities
Stack Identity has unveiled the expansion of the Identity Access Risk Management Platform with identity threat detection and response (ITDR) to tackle shadow access and shadow identities. Identity-centric attacks have exploded as the primary vector among cyberattacks, showcasing extreme gaps…
Venafi Stop Unauthorized Code Solution reduces attack surface
Venafi introduced its new Stop Unauthorized Code Solution, designed to help security teams proactively prevent unauthorized code across any operating environment. By leveraging the combined power of Venafi’s CodeSign Protect product, trusted team of security experts and expansive technology ecosystem,…
PoC for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)
Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears that attackers may soon take advantage of it. Fortra’s GoAnywhere MFT is a web-based managed file transfer solution widely used…
Enzoic and ThreatQuotient join forces to defend companies from compromised credentials
Enzoic announced a partnership with ThreatQuotient, an innovative security operations platform provider. Through the agreement, the latter is integrating Enzoic’s Dark Web monitoring capabilities to scan for exposure and help customers act at the first sign of compromise. The ThreatQ…
PoC exploit for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)
Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears that attackers may soon take advantage of it. Fortra’s GoAnywhere MFT is a web-based managed file transfer solution widely used…
VIVOTEK VORTEX Connect empowers enterprise cloud transition
VIVOTEK introduces its cloud-based security service VORTEX, emphasizing a smarter and easier approach. Now featuring the latest addition – VORTEX Connect, this new feature is integrated into VIVOTEK’s latest generation Network Video Recorders (NVRs), allowing users to seamlessly connect to…
Securiti collaborates with Lacework to improve data protection in the cloud
Securiti and Lacework announced a strategic partnership that allows customers to be smarter than ever when protecting cloud data. This collaboration unites Lacework, a Cloud Native Application Protection Platform (CNAPP), and Securiti’s Data Command Center with built-in Data Security Posture…
Stellar Cyber partners with Proofpoint to speed detection of email-driven cyberattacks
Stellar Cyber announced a new partnership with Proofpoint, a cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack…
The effect of omission bias on vulnerability management
Whether we’d like to admit it to ourselves or not, all humans harbor subconscious biases that powerfully influence our behavior. One of these is the omission bias, which has interesting ramifications in the world of cyber security, specifically vulnerability management.…
Prioritizing CIS Controls for effective cybersecurity across organizations
In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations of varying sizes. Marchany explores the importance of securing top-level management support, breaking down data silos,…
10 USA cybersecurity conferences you should visit in 2024
Security BSides Security BSides offers attendees an opportunity to engage and present their ideas actively. Characterized by its intensity, these events are filled with discussions, demonstrations, and interactive participation. BSides are happening all over the USA. To find an event…
Why resilience leaders must prepare for polycrises
In this Help Net Security video, Frank Shultz, CEO of Infinite Blue, discusses how more frequent and severe disruptions and our increasingly interconnected world collide to create a new threat for resilience leaders to manage: polycrises. These multiple concurrent or…
Organizations invest more in data protection but recover less
92% of organizations will increase 2024 data protection spend, to achieve cyber resilience amidst continued threats of ransomware and cyberattacks, according to Veeam Software. Respondents shared that cyberattacks remain the top cause of outages and that while organizations are putting…
Whitepaper: MFA misconceptions
While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses. Read the “MFA Misconceptions” whitepaper to understand its limitations and how integrating it with other robust security measures is crucial for building a resilient defense mechanism.…
Software supply chain attacks are getting easier
ReversingLabs identified close to 11,200 unique malicious packages across three major open-source software platforms in 2023: npm, PyPI, and RubyGems. These findings mark an astounding 1,300% increase in malicious packages from 2020 and an increase of 28% over 2022 when…
Tufin Dashboard Essentials tracks security implementation progress
Tufin announced Dashboard Essentials, a new extension to the Tufin Orchestration Suite that improves analytics for monitoring security, compliance, and operational efficiency. The extension gives customers access to specialized analytics tools that help track the progress of their security implementation…
Seceon aiSIEM-CGuard protects cloud-powered applications and infrastructure
Seceon announces aiSIEM-CGuard enabling partners and customers with comprehensive protection, detection, automatic remediation for cloud-powered resources. With an automated signup process and margin-friendly pricing, MSP/MSSPs can now add protection for cloud workloads like Microsoft 365 email, OneDrive, and endpoints and…
Cato Networks introduces new incident response tools
Cato Networks announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, a SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the…
Zscaler unveils Zero Trust SASE solution for simplified security implementation
Zscaler has introduced Zscaler Zero Trust SASE, single-vendor SASE solution built utilizing Zscaler Zero Trust AI to help organizations reduce cost and complexity while implementing zero trust security across users, devices, and workloads. Additionally, Zscaler announced general availability for its…