Tag: Help Net Security

Ron Kormanek joins Checkmarx’s executive management team

Checkmarx, a global leader in software security solutions for DevOps, announced that Ron Kormanek, vice president of North America sales, has been appointed to the company’s executive management team as it continues to drive rapid customer adoption and set the…

Joel Brunson joins Jazz Networks as CEO of Federal business

Jazz Networks, an award-winning insider threat security company, announced Joel Brunson has joined as CEO of Federal business. Brunson brings world-class leadership in business growth and proven expertise in the federal government sector. “In receiving the highest accolade in the…

Let’s Encrypt will revoke 3m+ TLS/SSL certificates

Starting with 20:00 UTC (3:00pm US EST), today (March 4), the non-profit certificate authority Let’s Encrypt will begin it’s effort to revoke a little over 3 million TLS/SSL certificates that it issued while a bug affected its CA software. Preliminary…

How adaptive trust makes security efficient

Zero trust is a comprehensive security framework that requires everyone—and every service account—to authenticate identity before entering the corporate network. Every app and every device, as well as all the data they contain, must also be verified for each session.…

Online payment fraud attempts see 73% increase

Online payment fraud attempts increased by 73 percent in 2019, according to a report from Sift. Additional findings in the report reveal that cybercriminals are using mobile devices more than desktops or laptops to commit payment fraud. In fact, though…

John F. Abbot joins Datto as Chief Financial Officer

Datto, the leading global provider of cloud-based software and technology solutions delivered through managed service providers (MSPs), announced that John F. Abbot has joined its executive management team as Chief Financial Officer (CFO), effective March 2, 2020. He is based…

Soon, your password will expire permanently

Passwords have been around since ancient times and they now serve as the primary method for authenticating a user during the login process. Individuals are expected to use unique username and password combinations to access dozens of protected resources every…

Do you have a data breach response plan?

While corporations today are more knowledgeable about security threats and prepared to respond to data breaches, there are key areas in which progress declined in 2019, according to a study conducted by the Ponemon Institute. Prepare beyond your data breach…

Dathena appoints Lylian Kieffer as CTO

Data-security and privacy pioneer Dathena announced the appointment of veteran software engineer Lylian Kieffer as its new Chief Technology Officer. Kieffer will lead Dathena’s engineering department, overseeing development and technical operations as the deep-tech leader expands its global offerings and…

5 considerations for building a zero trust IT environment

Zero trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not “verify, then trust” but “never trust and always verify.” Essentially, zero…

SECURITI.ai named Most Innovative Startup at RSA Conference 2020

SECURITI.ai was selected winner of the fifteenth-annual RSA Conference Innovation Sandbox Contest and named “Most Innovative Startup” by a panel of leading venture capitalists, entrepreneurs and industry veterans. SECURITI.ai is a leader in AI-powered PrivacyOps. Its PRIVACI.ai solution automates privacy…

Alsid’s new release further hardens AD security

Cybersecurity software provider Alsid releases Alsid for Active Directory version 2.6, the latest iteration of its industry-leading Active Directory (AD) security solution. Alsid for AD is a cloud-based, agentless solution that monitors the security of any Active Directory infrastructure component…

Photos: RSA Conference 2020, part 5

RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from the event, featured vendors include: MobileIron, CodeScan, BlockChain Security,…

Hacking has become a viable career, according to HackerOne

HackerOne announced findings from the 2020 Hacker Report, which reveals that the concept of hacking as a viable career has become a reality, with 18% describing themselves as full-time hackers, searching for vulnerabilities and making the internet safer for everyone.…

What is plaguing public sector cyber readiness?

IT complexity, insider threats, and an abundance of privileged users plague public sector cyber readiness, a SolarWinds report has revealed, based on the answers from 400 IT operations and security decisionmakers, including 200 federal, 100 state and local, and 100…

Photos: RSA Conference 2020, part 4

RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from the event, featured vendors and organization include: Shujinko, Build38,…

(ISC)2 and NTT-AT partner to bring cybersecurity training to Japan

(ISC)2 – the world’s largest nonprofit association of certified cybersecurity professionals – announced an expansion of its strategic partnership with NTT Advanced Technology Corporation (NTT-AT), which will bring more local-language cybersecurity training to Japan. Now recognized as an Official Training…

Secureworks launches Cloud Configuration Review

Secureworks announced at RSA Conference 2020 the launch of its new cloud configuration assessment. Based on VMware Secure State, the solution addresses pervasive security challenges in public cloud adoption, including the exposure of critical assets due to the misconfiguration of…

Photos: RSA Conference 2020, part 3

RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from the event, featured vendors and organization include: RSA, Microsoft,…

CWE list now includes hardware security weaknesses

The Mitre Corporation has released version 4.0 of the Common Weakness Enumeration (CWE) list, which has been expanded to include hardware security weaknesses. About CWE The Common Weakness Enumeration (CWE) is a category system for weaknesses and vulnerabilities. The project…

A new way for securing web browsers from hackers

A powerful new approach to securing web browsers is getting its first real-world application in the Firefox browser. Developed by a team of researchers from The University of Texas at Austin, the University of California San Diego, Stanford University and…

Modern malware is increasingly leveraging evasive behaviors

Modern malware is increasingly leveraging evasive behaviors, a new report by VMware Carbon Black released at RSA Conference 2020 has revealed. The report uncovers the top attack tactics, techniques, and procedures (TTPs) seen over the last year and provides specific…

What is driving the machine identity crisis?

Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of machines—from traditional physical devices, like laptops and servers, to virtual machines, containers, microservices, IoT devices…

One in five SMBs use no endpoint security at all

An alarming number of SMBs (small to medium businesses) in the US and UK are not prepared for a potential cyber attack or breach, BullGuard warns. One-third of companies with 50 or fewer employees report using free, consumer-grade cybersecurity, and…

Digital Guardian launches MDR service

Digital Guardian announced at RSA Conference 2020 the launch of its Managed Detection & Response (MDR) service, giving organizations a comprehensive data protection solution with 24/7 access to a team of skilled cybersecurity experts who actively hunt, detect, and mitigate…

Imperva launches Advanced Bot Protection solution

Imperva, the cybersecurity leader championing the fight to secure data and applications wherever they reside, announced Advanced Bot Protection, a new solution that fully integrates its industry-leading bot management technology into the Imperva Cloud Application Security solution. The solution enables…

Devolutions provides enterprise-grade PAM features to SMBs

At RSA Conference 2020, software developer Devolutions is on mission to ensure small and midsized businesses (SMBs) have the tools they need to safeguard data. Leading the way is a Privileged Access Management (PAM) solution called Devolutions Password Server, which…

Photos: RSA Conference 2020, part 2

RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Part one of the photos is available here. Here are a few photos from the…

Shadow IoT: A growing threat to enterprise security

Zscaler released their second annual IoT report, compiled after analyzing their customers’ IoT transactions in the Zscaler cloud for two weeks. The company found 553 different IoT devices across 21 categories from 212 manufacturers. Organizations around the world are observing…

Combat complexity to prevent cybersecurity fatigue

In today’s security landscape, the average company uses more than 20 security technologies. While vendor consolidation is steadily increasing with 86 percent of organizations using between 1 and 20 cybersecurity vendors, more than 20 percent feel that managing a multi-vendor…

Healthcare industry at greatest risk of data breach

The healthcare industry has significantly more exposed attack surfaces than any other industry surveyed, according to Censys’s research findings of cloud risks and cloud maturity by industry, revealed at RSA Conference 2020. Leveraging the Censys SaaS Platform, company researchers measured…

BlackBerry launches new UES platform for zero trust

BlackBerry announced at RSA Conference 2020 the BlackBerry Spark platform with a new unified endpoint security (UES) layer which can work with BlackBerry UEM and other unified endpoint management (UEM) solutions to deliver BlackBerry’s One Agent, One Console, One Crowd,…