Salt Security announced its integration with Google Cloud‘s Apigee API Management platform. With this technical collaboration, customers can discover all of their APIs, including shadow and deprecated APIs, apply posture rules, uncover areas of non-compliance, and stop API-based attacks at…
Tag: Help Net Security
New MIT protocol protects sensitive data during cloud-based computation
Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often require powerful cloud-based servers. This dependency on cloud computing raises notable security concerns, particularly in sensitive sectors like healthcare. Hospitals,…
AI use: 3 essential questions every CISO must ask
In July, Wall Street experienced its worst day since 2022, with the tech-focused Nasdaq falling by 3.6%. The downturn was largely triggered by what commentators suggest is the result of underwhelming earnings from some major tech companies. What’s notable is…
Rethinking privacy: A tech expert’s perspective
Data privacy has become one of the most pressing challenges of our time, but it didn’t happen overnight. The proliferation of data collection, coupled with the rise of advanced technologies like artificial intelligence and machine learning, has made it easier…
Compliance management strategies for protecting data in complex regulatory environments
In this Help Net Security interview, Andrius Buinovskis, Head of Product at NordLayer, discusses how organizations can assess their compliance management and ensure they meet regulatory requirements. Buinovskis also addresses the challenges of managing multiple frameworks and offers strategies for…
Companies mentioned on the dark web at higher risk for cyber attacks
The presence of any data relating to an organization on the dark web demonstrably increases its risk of a cyber attack, according to Searchlight Cyber. Dark web insights and breach correlation Marsh McLennan Cyber Risk Intelligence Center analyzed the dark…
Malwarebytes Personal Data Remover protects user privacy
Malwarebytes introduced its latest consumer product, Personal Data Remover, designed to protect user privacy by assisting users with the deletion of personal information from data broker databases and people search sites. This new solution offers regular monitoring to ensure individuals’…
PoC for critical SolarWinds Web Help Desk vulnerability released (CVE-2024-28987)
Details about and proof-of-concept (PoC) exploit code for CVE-2024-28987, a recently patched SolarWinds Web Help Desk (WHD) vulnerability that could be exploited by unauthenticated attackers to remotely read and modify all help desk ticket details, are now public. “When assessing…
Onapsis expands security for SAP Business Technology Platform
Onapsis announced new capabilities for its flagship solutions, Onapsis Defend and Onapsis Assess, designed to secure the SAP Business Technology Platform (SAP BTP). As more customers adopt SAP S/4HANA cloud and move to RISE with SAP, SAP BTP provides a…
Tamnoon raises $12 million to reduce critical cloud exposures
Tamnoon announced it has raised $12 million in Series A funding. The round was led by cybersecurity investment firm Bright Pixel Capital (formerly Sonae IM), with participation by new investors Blu Ventures and Mindset Ventures as well as existing investors…
Ivanti vTM auth bypass flaw exploited in attacks, CISA warns (CVE-2024-7593)
CVE-2024-7593, a critical authentication bypass vulnerability affecting Ivanti Virtual Traffic Manager (vTM) appliances, is actively exploited by attackers. The confirmation comes from the Cybersecurity and Infrastructure Security Agency (CISA), which added the flaw to its Known Exploited Vulnerabilities catalog, thus…
Portnox enhances passwordless risk-based access for enterprise applications
Portnox announced support for Microsoft External Authentication Methods (EAM) for its Conditional Access for Applications solution. This new integration extends Portnox’s commitment to delivering phishing-resistant passwordless authentication with risk-based assessment and compliance validation for enterprise applications. Microsoft’s EAM capability allows users…
Nudge Security introduces automated SaaS spend discovery capabilities
Nudge Security unveiled an automated SaaS spend discovery capabilities, building on the company’s patented approach to SaaS discovery to include analysis and insights into previously unknown SaaS spend. At a time when organizations are trying to rationalize app estates to…
ManageEngine Analytics Plus 6.0 identifies key inefficiencies in IT operations
ManageEngine announced a significant upgrade to its flagship IT analytics solution, Analytics Plus. Version 6.0 introduces Spotlight, a contextual recommendations engine powered by AI, designed to identify key inefficiencies in IT operations and suggest corrective strategies. The 2023 State of…
NETSCOUT’s nGeniusONE notification center streamlines and automates alerts
NETSCOUT announced enhancements to its nGenius Enterprise Performance Management solution, which includes a new notification center that helps streamline and automate alerts and contextual workflows to identify and resolve problems faster. Secured Reliable Transport (SRT) was added to support live…
Bitwarden inline autofill empowers users to fill passkeys directly from their vault
Bitwarden announced further enhancements to inline autofill capabilities within the Bitwarden browser extension. Following the recent addition of autofill for cards and identities, this update ensures seamless autofill of passkeys, providing a faster, more secure, and convenient way for users…
OneTrust helps organizations operationalize DORA compliance
OneTrust announced new capabilities to help organizations enhance resilience across the financial sector and operationalize compliance with the EU’s Digital Operational Resilience Act (DORA). Building upon its comprehensive OneTrust Third-Party Management solution, OneTrust will now offer first-to-market capabilities such as…
Commvault acquires Clumio to accelerate cyber resilience capabilities for AWS
Commvault announced it will acquire Clumio, a technology leader in data protection for critical cloud data in AWS. This transaction enables Commvault to leverage Clumio’s AWS offerings to provide cyber resilience to next generation applications built on AWS. Clumio serves…
Securing non-human identities: Why fragmented strategies fail
In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs). With NHIs now outnumbering human identities by 20 to 1, organizations are struggling to secure these…
NetAlertX: Open-source Wi-Fi intruder detector
NetAlertX is an open-source Wi-Fi/LAN intruder detection tool that scans your network for connected devices and alerts you when new or unknown devices are detected. It provides visibility into your network activity to help you monitor unauthorized access. “NetAlertX comes…