Category: Help Net Security

One in five CISOs miss out on pay raise

The CISO role was partially shielded from the macroeconomic challenges of 2023, according to a new research from IANS and Artico Search. 20% of CISOs did not receive a raise The most recent average CISO total compensation increase was 11%,…

Anticipating the benefits of a passwordless tomorrow

Businesses are actively moving to eradicate passwords from employees’ lives, with 89% of IT leaders expecting passwords to represent less than a quarter of their organization’s logins within five years or less, according to a FIDO Alliance and LastPass report.…

Zyxel Networks introduces 22Gbps WiFi 7 access point for MSPs and SMBs

Zyxel Networks launched its first WiFi 7 access point for managed service providers (MSPs) and small- to medium-sized businesses (SMBs). Zyxel’s WBE660S WiFi 7 BE22000 Triple-Radio NebulaFlex Pro Access Point provides enterprise-grade technology, exceptional performance, and seamless cloud-based management and…

Microsoft announces AI bug bounty program

Microsoft is offering up to $15,000 to bug hunters that pinpoint vulnerabilities of Critical or Important severity in its AI-powered “Bing experience”. “The new Microsoft AI bounty program comes as a result of key investments and learnings over the last…

CISOs and board members are finding a common language

86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and freeing up security professionals to be more strategic, according to Splunk. 35% report using generative AI…

Keeping control in complex regulatory environments

Modern compliance programs represent a strategic shift in how companies approach regulatory and ethical obligations. They are designed to not only mitigate risks and avoid legal repercussions but also to enhance an organization’s reputation, foster a culture of integrity, and…

Inadequate IoT protection can be a costly mistake

97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations experienced certificate outages in the last 12 months, costing an average of over…

IDEMIA, HYPR and Wavelynx partner to launch converged access card

IDEMIA announced the development of a secure, standards-based converged access card for the enterprise access market, in collaboration with HYPR and Wavelynx. The creation of this smart credential will help organizations meet compliance and regulatory requirements and security best practices.…

Stronger ransomware protection finally pays off

60% of companies are ‘very’ to ‘extremely’ concerned about ransomware attacks, according to latest research from Hornetsecurity. Businesses acknowledge ransomware risk Hornetsecurity revealed that 92.5% businesses are aware of ransomware’s potential for negative impact. Still, just 54% of respondents said…

New infosec products of the week: October 13, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Flexxon, Fortanix, Fortinet, SailPoint, and Vanta. Flexxon Xsign protects sensitive data reserved only for authorized personnel With the use of the Xsign hardware security…

Introducing the book: Irreducibly Complex Systems

In this Help Net Security video interview, David Hunt, CTO at Prelude, discusses his book – Irreducibly Complex Systems: An Introduction to Continuous Security Testing. Continuous security testing (CST) is a new strategy for validating cyber defenses. We buy security…

AI-enabled bots can solve CAPTCHAs faster than humans

Companies are losing revenue in the fight against malicious bot attacks, according to survey by Kasada. Despite spending millions of dollars on traditional bot management solutions, companies are still financially impacted by bot attacks. 38% of respondents estimate that a…

Edgio Application Bundles eliminate unpredictable usage-based costs

Edgio introduced Protect and Perform Applications Bundles, a solution that combines Tier-1 web performance capabilities with a full-spectrum web security suite and enterprise-level SOC support services – all in a single, comprehensive package. The new offering eliminates complex billing structures…

Check Point Quantum SASE protects hybrid work and cloud networks

Check Point launched Quantum SASE, integrating technologies from newly acquired Perimeter 81. This integrated offering addresses organizations’ needs for a unified user experience, simplified SASE management, and a fast, secure browsing experience. It enhances the company’s Infinity architecture with a…

Wallarm and MuleSoft empower users to tackle API threats

Wallarm today announced general availability of the seamless Application and API Security policy integration with MuleSoft AnyPoint Platform. In today’s digital landscape, business and technical leaders must ensure that their Apps and APIs remain shielded, regardless of the deployment avenue…

Sic Permission Slip on data brokers that use your data

Permission Slip, an iPhone and Android app developed by Consumer Reports, helps users ask companies and data brokers to stop sharing their personal data and/or delete it. The Permission Slip app (Source: Consumer Reports) US consumer data privacy laws The…

Yeti: Open, distributed, threat intelligence repository

Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically, such as domain resolution and IP geolocation, saving you the effort. With its user-friendly interface built on Bootstrap and a…

Unmasking the limitations of yearly penetration tests

In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous penetration testing because yearly ones are not enough. They leave blind spots and cannot match the security needs of regular…

Keeping up with the demands of the cyber insurance market

Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into completely unknown territory to gain market share. Now, 26 years later, cyber insurance…

Cybersecurity should be a business priority for CEOs

74% of CEOs are concerned about their organizations’ ability to avert or minimize damage to the business from a cyberattack – even though 96% of CEOs said that cybersecurity is critical to organizational growth and stability, according to Accenture. CEOs…

DAT’s risk assessment engine protects customers against fraud

DAT Freight & Analytics introduced an innovative new risk assessment engine that uses artificial intelligence and DAT’s extensive proprietary data to give customers an insight into a potential partner’s risk profile and performance. DAT’s new risk assessment engine uses machine…

Honeywell Cyber Watch identifies OT cyber threats

Honeywell launched Cyber Watch, an enterprise solution designed to help organizations better identify, mitigate and manage the latest OT cyber threats. “Everyone from the plant manager to the CISO is a line of defense against the next cyberattack. No company…

OpenText unveils AI capabilities in Cloud Editions 23.4

OpenText introduced OpenText Aviator AI capabilities in Cloud Editions 23.4. For over a decade, OpenText has been helping organizations manage and secure large complex data sets from IoT and robotics, to natural language processing, to complex systems and generative AI.…

Veza launches Next-Gen IGA to help enterprises reduce identity risks

Veza launched its Next-Gen IGA (Identity Governance and Administration) solution. The solution comprises the Veza Access Control Platform and new products for provisioning and deprovisioning, access reviews, access visibility, and access intelligence. By approaching governance with a focus on permissions…

BlackBerry and AWS introduce two UEM innovations

BlackBerry announced two major new Unified Endpoint Management (UEM) innovations – BlackBerry UEM at the edge and BlackBerry UEM for the IoT. BlackBerry UEM software is used for managing, monitoring, and securing all of an organization’s end-user devices. Taking BlackBerry…

$2.7 billion lost to social media scams since 2021

Scams originating on social media have accounted for $2.7 billion in reported losses since 2021, more than any other contact method, according to the Federal Trade Commission. Social media gives scammers an edge in several ways. They can easily manufacture…

Cyber insurance costs pressure business budgets

Cyber insurance is a type of insurance policy that provides financial protection and support to individuals and organizations in the event of cyber incidents, including data breaches, hacking, ransomware attacks, and other cyber threats. It typically covers expenses such as…

iboss introduces Splunk Enterprise Security capability

In an era dominated by increasingly complex cybersecurity threats and the undeniable importance of meticulous data management, iboss unveils a new feature – the Splunk Enterprise Security capability. This latest addition will redefine the paradigms of data log collection, visibility,…

iboss introduces Splunk enterprise security capability

In an era dominated by increasingly complex cybersecurity threats and the undeniable importance of meticulous data management, iboss unveils a new feature – the Splunk Enterprise Security capability. This latest addition will redefine the paradigms of data log collection, visibility,…

New infosec products of the week: October 6, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Cloaked, ComplyCube, LogicMonitor, ManageEngine, Nutanix, and Veriff. Veriff unveils fraud mitigation solutions Veriff launched its new Fraud Protect & Fraud Intelligence packages. Both packages use…

Enterprises see AI as a worthwhile investment

92% of AI team leaders at leading-edge organizations felt that their AI initiatives are generating value, according to Wallaroo.AI. Having found a successful formula, most of those surveyed plan to dramatically increase their spend on ML and use of ML…

Poor cybersecurity habits are common among younger employees

One in three employees believe their actions do not impact their organization’s security, according to Ivanti. Unsafe cybersecurity habits among office workers The research also shows that Millennial and Gen Z office workers are more likely to have unsafe cybersecurity…

Are executives adequately guarding their gadgets?

Today, individual citizens, rather than businesses or governmental bodies, are the main entry points for cyberattacks. However, security solutions haven’t evolved sufficiently to guard public figures and leaders as they do for large corporate entities. In this Help Net Security…

IBM unveils AI-powered TDR Services

IBM has unveiled the next evolution of its managed detection and response service offerings with new AI technologies, including the ability to automatically escalate or close up to 85% of alerts, helping to accelerate security response timelines for clients. The…

Cobalt Iron enhances recovery with Isolated Vault Services

Cobalt Iron has unveiled Isolated Vault Services, a new enhancement available in the Cobalt Iron Compass enterprise SaaS backup platform. Isolated Vault Services makes it possible to transition normal backup operations into isolated vault recovery services. It is intended for…

Okta AI helps companies responsibly innovate with AI

Okta announced Okta AI, a suite of AI-powered capabilities that empowers organizations to harness the power of AI to build better experiences and protect against cyberattacks. Embedded across both Workforce Identity Cloud and Customer Identity Cloud, Okta AI powers real-time…

High-business-impact outages are incredibly expensive

In this Help Net Security video, Peter Pezaris, Chief Strategy and Design Officer at New Relic, discusses observability adoption and how full-stack observability leads to better service-level metrics, such as fewer, shorter outages and lower outage costs. 32% of respondents…

LLMs lower the barrier for entry into cybercrime

Cybercriminals employ evolving attack methodologies designed to breach traditional perimeter security, including secure email gateways, according to Egress. “Without a doubt chatbots or large language models (LLM) lower the barrier for entry to cybercrime, making it possible to create well-written…

Soft skills continue to challenge the cybersecurity sector

New cybersecurity findings pinpoint areas where cybersecurity experts are lacking, with interpersonal skills, cloud computing, and security measures standing out as the most prominent skill deficiencies in cybersecurity specialists, according to a new ISACA report. 59 percent of cybersecurity leaders…

The root cause of open-source risk

2023 saw twice as many software supply chain attacks as 2019-2022 combined. Sonatype logged 245,032 malicious packages in 2023. One in eight open-source downloads today poses known and avoidable risks. Vulnerabilities can still be prevented Nearly all (96%) vulnerabilities are…

Backdoored Android phones, TVs used for ad fraud – and worse!

A key monetization mechanism of a sophisticated series of cybercriminal operations involving backdoored off-brand mobile and CTV Android devices has been disrupted, Human Security has announced. The company’s Satori Threat Intelligence and Research Team observed more than 74,000 Android-based mobile…