Tag: Help Net Security

Infoblox announces enterprise best practices for DoT/DoH

Infoblox, the leader in Secure Cloud-Managed Network Services, announced Enterprise best practices on DNS over TLS (also known as DoT) and DNS over HTTPS (DoH). These DoT/DoH guidelines are based on Infoblox’s longtime commitment to providing customers with DDI services…

Review: Specops Key Recovery

Mobile device use continues to grow, while an increasingly mobile and remote workforce depends heavily on laptops. To secure those devices, organizations need to implement client-side security controls. One of the more pressing risks linked to the use of mobile…

The importance of risk reduction for robotic process automation

Less than half of organizations have a privileged access management strategy in place for digital transformation technologies, like RPA, according to a CyberArk report. The report provides practical recommendations from information security executives based on their first-hand experiences. They share…

F5 delivers multi-cloud security solutions for apps, services

F5 introduced at RSA Conference 2020 its customer-focused approach to Application Protection, bolstered by new offerings and the company’s recent acquisition of Shape Security. Informed by customer use cases, prominent industry attack practices, and threat intelligence from F5 Labs, F5’s…

Changing the mindset of the CISO: From enforcer to enabler

With digital transformation investments expected to reach a staggering $7.4 trillion before 2023, organizations realize that they must disrupt their markets or risk being disrupted themselves. However, with digital transformation comes a multitude of cybersecurity-related challenges to overcome, and it’s…

Increased monetization means more ransomware attacks

Organizations are detecting and containing attacks faster as the global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, was 56 days. This is 28% lower than the 78-day median observed…

Organizations lack confidence in their network security

IoT is barreling toward the enterprise, but organizations remain highly vulnerable to IoT-based attacks, according to Extreme Networks. The report, which surveyed 540 IT professionals across industries in North America, Europe, and Asia Pacific, found that 84% of organizations have…

Download: The Ultimate Security Pros’ Checklist

The Ultimate Security Pros’ Checklist provides you with a concise and actionable way to keep track of all your operational, management and reporting tasks. This checklist fully maps the core duties of common security positions – CISO/CIO, Director of Security,…

CrowdStrike appoints Michael Sentonas as CTO

CrowdStrike, a leader in cloud-delivered endpoint protection, announced the appointment of Michael Sentonas as the company’s new chief technology officer effective immediately. Sentonas, who most recently served as the vice president of technology strategy at CrowdStrike, is replacing Dmitri Alperovitch,…

Worldwide ICT spending forecast to reach $4.3 trillion in 2020

Worldwide spending on information and communications technology (ICT) is forecast to reach $4.3 trillion in 2020, an increase of 3.6% over 2019, according to IDC. Commercial and public sector spending on information technology (hardware, software and IT services), telecommunications services,…

ElectionShield protects political campaigns from online threats

ElectionShield utilizes BrandShield’s technology to protect political campaigns and candidates from a growing range of online threats. These include social impersonation; fraudulent fundraising schemes; domain squatting; sale of unauthorized merchandise; fake social media content; phishing, social phishing and fake news.…

QuintessenceLabs secures investment and expands quantum-safe portfolio

QuintessenceLabs, the leader in quantum-cybersecurity solutions, announced that it secured an investment from In-Q-Tel, the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to the national security communities of the U.S. and its allies. This investment…

CyberX integrates with Microsoft Azure Security Center

CyberX announced a new API-level integration with Microsoft Azure Security Center for IoT, enabling joint clients to gain a unified view of security across all their managed and unmanaged IoT devices. The combination of CyberX’s agentless security platform and Azure…

Gil Vega joins Veeam Software as CISO

Veeam Software, the leader in Backup solutions that deliver Cloud Data Management, announced that Gil Vega has been appointed Chief Information Security Officer (CISO). Vega, whose previous experience includes serving as Managing Director and CISO at CME Group and as…

What is flowing through your enterprise network?

Since Edward Snowden’s revelations of sweeping internet surveillance by the NSA, the push to encrypt the web has been unrelenting. Bolstered by Google’s various initiatives (e.g., its prioritizing of websites that use encryption in Google Search results, making Chrome mark…

Are CISOs ready for zero trust architectures?

Zero trust is a concept that is gaining an increasingly large and dedicated following, but it may mean different things to different audiences, so let’s start with a definition. I refer to an excellent post by my friend Lee Newcombe…

BluBracket unveils security solution that makes code safe

BluBracket, the leader in securing code for the enterprise, introduced its product suite, representing the industry’s first comprehensive security solution for code in the enterprise. As a testament to its early technical lead in an important new category, BluBracket has…

ThreatConnect hires four new senior management team members

In an effort to further position itself for rapid marketplace growth, ThreatConnect, provider of the industry’s only intelligence-driven security operations platform, announces the hiring of four new senior management team members: Miles R. Tappin, Vice President, EMEA; Steve Mariani, VP,…

US gas pipeline shut down due to ransomware

An unnamed US gas pipeline operator has falled victim to ransomware, which managed to encrypt data both on its IT (information technology) and operational technology (OT) networks and led to a shutdown of the affected natural gas compression facility, the…

The top four Office 365 security pain points

Many novice Office 365 (O365) shops do not know where platform-specific security vulnerabilities lie, or even that they exist. The threats that you are unaware exist do not cause pain until they rise up and bite – then the agony…

Test CISSP knowledge with interactive flash cards

Study for the CISSP exam anytime, anywhere using Official (ISC)² CISSP flash cards. This free interactive self-study tool tests knowledge across all eight CISSP domains and gives you immediate feedback to reinforce learning. The vendor-neutral CISSP stands out as the…

SIRP Security Score: Prioritize your threat response

SIRP launched a new security scoring module, S3, a major update to its platform. SIRP Security Score (S3) calculates an organization’s security score based on a number of internal and external factors. This enables organizations to more effectively prioritize risks,…

IT and business process automation growing with cloud architectures

Many organizations are starting to realize the benefits of increased scale and velocity of application deployment in their businesses, according to F5 Networks. This value, however, can bring significant complexity as organizations maintain legacy infrastructure while increasingly relying on multiple…