NinjaOne and SentinelOne launched a bi-directional product integration that redefines endpoint protection through the merging of IT operations and security. The solution provides enterprise security teams with leading levels of control and simplicity, while revolutionizing the management and security of…
Category: Help Net Security
Preparing for the NIS2 Directive
The EU’s NIS Directive (Directive on security of network and information systems) was established to create a higher level of cybersecurity and resilience within organizations across the member states. It was updated in January 2023 to bring more organizations into…
Understanding employees’ motivations behind risky actions
More 68% of employees knowingly put their organizations at risk, potentially leading to ransomware or malware infections, data breaches, or financial loss, according to Proofpoint. Perception on security responsibility And while the incidence of successful phishing attacks has slightly declined…
AI-driven DevOps: Revolutionizing software engineering practices
In this Help Net Security interview, Itamar Friedman, CEO of Codium AI, discusses the integration of AI into DevOps practices and its impact on software development processes, particularly in automating code review, ensuring compliance, and improving efficiency. Despite the benefits,…
AI in cybersecurity presents a complex duality
Companies more than ever view GRC (Governance, Risk, and Compliance) as a holistic process and are taking steps toward getting a complete view of their risk environment and compliance obligations, according to Hyperproof. Centralized GRC strategy gains momentum Centralizing strategy,…
How AI is reshaping the cybersecurity job landscape
88% of cybersecurity professionals believe that AI will significantly impact their jobs, now or in the near future, and 35% have already witnessed its effects, according to ISC2’s AI study, AI Cyber 2024. Impact of AI on cybersecurity professionals While…
SpinSPM for Salesforce identifies misconfigurations within SaaS applications
Spin.AI released SpinSPM for Salesforce. This SaaS Security Posture Management (SSPM) solution allows security professionals and IT administrators to proactively secure Salesforce environments. With complete configuration visibility, ongoing management, automated tools for incident response, and much more, organizations can reduce…
PKI Solutions introduces new version of PKI Spotlight
PKI Solutions introduced a new version of PKI Spotlight, a real-time monitoring and alerting system that provides live status, availability, configuration, and security of PKI environments (Microsoft PKI and others) and hardware security modules (HSMs). The latest release of PKI…
VIAVI enhances Observer Sentry’s exposure and vulnerability analysis
VIAVI Solutions announced the addition of traffic analysis capabilities to its Observer Sentry Software-as-a-Service-based threat exposure management solution. With traffic visibility, Observer Sentry goes beyond identifying unintended and potentially dangerous exposures, and enables SecOps, DevOps and cloud architects to determine…
Akamai extends its segmentation solution to hybrid cloud environments
Akamai announced that it is extending its segmentation solution, Akamai Guardicore Segmentation, to hybrid cloud environments. Extending Akamai Guardicore Segmentation to the cloud helps reduce attack surfaces and helps contain attacks targeting cloud-native workloads. Network security professionals can seamlessly manage…
AgileBlue Sapphire AI streamlines SecOps and SOAR processes
AgileBlue announced the availability of Sapphire AI in its Cerulean XDR|SOAR platform. The advanced AI system reinforces the company’s commitment to customer excellence, serving as the first line of defense against a cyberattack. With cyber threats evolving at an alarming…
White House: Use memory-safe programming languages to protect the nation
The White House is asking the technical community to switch to using memory-safe programming languages – such as Rust, Python, Swift, C#, Java, and Go – to prevent memory corruption vulnerabilities from entering the digital ecosystem. According to a recent…
AU10TIX KYB solution validates info against global registries and jurisdictions
AU10TIX launched an Know Your Business (KYB) solution that enables companies to know exactly who they are doing business with and avoid potential financial and reputational losses. By combining KYB with Know Your Customer (KYC) processes, the offering addresses every…
Legato Security Ensemble helps organizations prevent breaches
Legato Security launched Ensemble, a security operations platform that is poised to redefine how organizations detect, manage, and respond to threats. Ensemble empowers organizations to optimize their security investments by unifying threat detection, providing context, and offering the visibility necessary…
Meta plans to prevent disinformation and AI-generated content from influencing voters
Meta, the company that owns some of the biggest social networks in use today, has explained how it means to tackle disinformation related to the upcoming EU Parliament elections, with a special emphasis on how it plans to treat AI-generated…
APT29 revamps its techniques to breach cloud environments
Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five Eyes intelligence alliance have warned. About APT29 APT29 (aka Midnight Blizzard, aka Cozy Bear) is a cyber espionage group believed…
Bitwarden Secrets Manager integrates with Ansible Playbook
Bitwarden enhanced Bitwarden Secrets Manager by integrating with Ansible Playbook. This out-of-the-box integration enables developers and DevOps teams to securely streamline their server deployment processes using zero knowledge end-to-end encryption to enhance their security posture. The need for speed in…
Octopus Deploy acquires Codefresh to drive innovation in continuous delivery
Octopus Deploy announced the acquisition of Codefresh. Codefresh, founded in 2014 by Oleg Verhovsky and Raziel Tabib, is Argo maintainer and leader in Kubernetes CD, GitOps, and CI. The acquisition marks a significant milestone as Octopus strengthens its support for…
NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure
The National Institute of Standards and Technology (NIST) has updated its widely utilized Cybersecurity Framework (CSF), a key document for mitigating cybersecurity risks. The latest version, 2.0, is tailored to cater to a broad range of audiences, spanning various industry…
Using AI to reduce false positives in secrets scanners
As development environments grow more complex, applications increasingly communicate with many external services. When a software development project communicates with an external service, it utilizes a token or “secret” for authentication. These tokens are the glue that keeps any modern…