To manage an environment of increasing risks and limited resources, healthcare internal audit and compliance departments must align their risk assessments and audit work plans to areas most vital to achieving the strategic goals and business objectives of their organizations,…
Category: Help Net Security
Dynatrace acquires Runecast to improve cloud-native security
Dynatrace announced it signed a definitive agreement to acquire Runecast, a provider of AI-powered security and compliance solutions. Adding Runecast to the Dynatrace platform will extend Dynatrace contextual security protection and analytics with Runecast security posture management. This will enable…
Juniper Networks introduces AI-Native Networking Platform
Juniper Networks announced an AI-Native Networking Platform, purpose-built to leverage AI to assure the best end-to-end operator and end-user experiences. Trained on seven years of insights and data science development, Juniper’s AI-Native Networking Platform was designed from the ground up…
Critical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897)
Several proof-of-concept (PoC) exploits for a recently patched critical vulnerability (CVE-2024-23897) in Jenkins has been made public and there’s evidence of exploitation in the wild. About CVE-2024-23897 Jenkins is a widely used Java-based open-source automation server that helps developers build,…
Exploring the intersection of network security and modern technologies
Networks serve as the backbone of modern communication and business operations, facilitating seamless data exchange and connectivity. However, the increasing complexity of networks also brings forth heightened security challenges. Robust network security measures are essential to safeguard against cyber threats,…
Cybercriminals embrace smarter strategies, less effort
2024 is shaping up to be a record-breaking year for data breaches, according to Experian. Despite 2023 being labeled as a ‘successful’ year for malicious actors, the upcoming months may bring forth developments that could further disrupt the cybersecurity landscape.…
Global critical infrastructure faces relentless cyber activity
In the last year, the world’s critical infrastructure – the medical, power, communications, waste, manufacturing, and transportation equipment that connects people and machines – has been under near-constant attack, according to Forescout. Despite the formidable challenges posed by the ongoing…
Prioritizing cybercrime intelligence for effective decision-making in cybersecurity
In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous adaptation in cybersecurity strategies to practical…
Third-party risk management best practices and why they matter
With organizations increasingly relying on third-party vendors, upping the third-party risk management (TPRM) game has become imperative to prevent the fallout of third-party compromises. Third-party risks SecurityScorecard recently found that 98% of organizations are connected with at least one third-party…
What makes ransomware victims less likely to pay up?
There’s a good reason why ransomware gangs started exfiltrating victims’ data instead of just encrypting it: those organizations pay more. University of Twente researcher Tom Meurs and his colleagues wanted to know which factors influence victims to pay the ransom…
Longer passwords aren’t safe from intensive cracking efforts
88% of organizations still use passwords as their primary method of authentication, according to Specops Software. The report found that 31.1 million breached passwords had over 16 characters, showing longer passwords aren’t safe from being cracked. 40,000 admin portal accounts…
New infosec products of the week: January 26, 2024
Here’s a look at the most interesting products from the past week, featuring releases from 1Kosmos, Atakama, Onfido, Regula, Searchlight Cyber, Seceon, and Veriti. Onfido Compliance Suite simplifies local and global identity verification Onfido’s Compliance Suite introduces Qualified Electronic Signature…
Emerging trends and strategies in digital forensics
In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of modern computer systems and networks on digital evidence collection. Schroader talks about the impact of exponential data growth on forensic…
Budget cuts loom for data privacy initiatives
The past year saw developments and updates to privacy regulations across the globe—from India’s Personal Data Protection Bill to Brazil’s General Data Protection Law, according to ISACA. However, only 34% of organizations say they find it easy to understand their…
Essential questions for developing effective human rights policies
Growing environmental, social, and governance (ESG) expectations and expanding global regulation are propelling organizations to consider implementing a stand-alone human rights policy, according to Gartner. Public focus on human rights Shareholder proposals and media reports continue to put human rights…
Vercara introduces the Private Data Lake feature into UltraDNS
Vercara is introducing a new Private Data Lake feature to its UltraDNS product. The UltraDNS Private Data Lake offers a novel approach to managing and analyzing DNS data, providing businesses with access to their entire DNS query data and advanced…
Searchlight Cyber adds AI-powered language translation to simplify dark web investigations
Searchlight Cyber has added AI-powered language translation into its dark web investigation and monitoring products DarkIQ and Cerberus. This enhancement gives cybersecurity professionals instant access to precisely translated results in English, allowing them to search, monitor, and understand threats in…
Kyndryl and Cisco unveil two security edge services
Kyndryl announced two new security edge services developed jointly with Cisco to help customers improve their security controls and proactively address and respond to cyber incidents. The new security edge services introduced by Kyndryl are: Kyndryl Consult Security Services Edge…
Guardian Air boosts Nozomi Networks threat detection, securing from endpoint to air
Nozomi Networks has introduced Guardian Air, the wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases…
Regula introduces smart testing for remote onboarding efficiency
Currently, over 75% of countries worldwide use electronic documents equipped with NFC chips. Due to this fact, virtually every business has to deal with such kinds of IDs during customer onboarding. This calls for customized identity verification (IDV) systems to…