Tag: Help Net Security

BeyondTrust introduces identity security controls for AI

BeyondTrust released new AI security controls in Identity Security Insights. These capabilities provide visibility into AI agents, secure orchestration of their actions, and an on-board intelligence layer to help teams make faster, smarter security decisions. “The rise of AI agents…

How a fake ICS network can reveal real cyberattacks

Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet built to closely mimic a real industrial environment. Why traditional honeypots fall short Honeypots are systems designed to attract attackers…

Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving worldwide. He talks about how organizations can stay compliant with international rules while keeping their systems practical and user-friendly. Goldberg…

Bots vs. humans? Why intent is the game-changer

In this Help Net Security video, Jérôme Segura, VP of Threat Research at Datadome, explains why intent, not just identifying bots, must be the new focus for cybersecurity teams. He explores how advanced AI agents and sophisticated bots blur the…

Neon Cyber exits stealth with Workforce Cybersecurity Platform

Neon Cyber announced its emergence from stealth and unveiled the first Workforce Cybersecurity Platform (WCP), delivering protection across browsers, SaaS applications and enterprise systems in every department. Built by cybersecurity veterans with decades of experience, Neon was created to solve…

Digital.ai brings expert-level cryptography to any developer team

Digital.ai released its App Sec White-box Cryptography Agent to simplify application security for developers and help customers ensure that every application requiring protection is secured. The Agent makes white-box cryptography, long considered an expert-only discipline, accessible to any development team,…

N-able strengthens backup threat protection

N-able has enhanced the capabilities of Cove Data Protection with the launch of Anomaly Detection as a Service (ADaaS). Strengthening Cove’s defense against cyberthreats, this service is built into Cove’s architecture with no additional management overhead or cost impact. Cyberattacks…

GitHub adds post-quantum protection for SSH access

GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company’s preparation for a time when current encryption may no longer be safe. What GitHub is changing GitHub has introduced a new type of SSH key…