Tag: Help Net Security

Do your employees feel valued? 64% have one foot out the door

The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. This makes retaining employees a top priority, but how can companies…

Now available: eSentire’s 2019 Annual Threat Intelligence Report

Recently released, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020 provides visuals, data and written analysis, as well as practical recommendations for readers seeking to understand and better respond to the cybersecurity threat landscape. By shining…

Absolute is strengthening endpoint resilience for its customers

Absolute, the leader in endpoint resilience, announced the company is extending the power of its Resilience solution and patented Persistence technology to a growing ecosystem of leading endpoint security applications. Leveraging its firmware-embedded capabilities in more than 500 million endpoint…

eSentire appoints Charles “C.J.” Spallitta as Chief Product Officer

eSentire, the global leader in cloud-delivered Managed Detection and Response (MDR), announced the appointment of Charles “C.J.” Spallitta as the company’s new Chief Product Officer, effective immediately. Spallitta will be responsible for eSentire’s entire product portfolio including vision, strategy and…

Patrick Bruce-Lockhart joins Softchoice as Vice President of Sales

Softchoice, a leading North American provider of IT solutions and managed services, announced the appointment of Patrick Bruce-Lockhart, a seasoned technology leader, as a Vice President in its Sales organization. He will report to Kevin Hendrick, Senior Vice-President, Sales. Bruce-Lockhart…

Make your own security key with Google’s OpenSK

Google has open-sourced OpenSK, firmware that, combined with an affordable chip dongle, allows you to make your own security key to use for authentication purposes. About OpenSK OpenSK isan open-source implementation for security keys that supports both FIDO U2F and…

New infosec products of the week: January 31, 2020

Swimlane 10.0: Reducing mean time to detect and response for security incidents The newest release has yielded up to 35X performance improvement in alarm ingestion rates and up to a 60X improvement in search query response and display rates. Both…

80% of successful breaches are from zero-day exploits

Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that compromised data assets or…

Researchers develop new optical stealth encryption technology

The first all optical stealth encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network transmission, has been introduced by BGN Technologies. Time is running out on security and privacy “Today, information…

Semtech releases LoRa-based Asset Tracking Reference Kit

Semtech, a leading supplier of high performance analog and mixed-signal semiconductors and advanced algorithms, announced the release of its Asset Tracking Reference Kit to accelerate the adoption of asset tracking solutions based on LoRa devices and the LoRaWAN protocol, and…

Arceo appoints Mike Convertino as CSO

Mike Convertino, the former CISO of Twitter, Crowdstrike and F5 Networks as well as CTO of the Security Product Group at F5, has joined Arceo as Chief Security Officer and he is on a mission. Mike, and a growing tribe…

Daniel Kollberg joins SentinelOne as VP of EMEA

SentinelOne, the autonomous endpoint protection company, announced the appointment of Daniel Kollberg as Vice President EMEA. The appointment supports SentinelOne’s record growth across the globe on the journey of becoming the next great cybersecurity company, through helping organizations use AI…

UN hacked: Attackers got in via SharePoint vulnerability

In summer 2019, hackers broke into over 40 (and possibly more) UN servers in offices in Geneva and Vienna and downloaded “sensitive data that could have far-reaching repercussions for staff, individuals, and organizations communicating with and doing business with the…

Photos: Cybertech Global Tel Aviv 2020

Cybertech Global Tel Aviv is one of the largest B2B networking events in the cyber industry, outside of the United States. Every year, the event attracts thousands of attendees, mainly C-level executives, investors, professionals, and government officials from all over…

Photos: Cybertech Tel Aviv 2020

Cybertech Tel Aviv is one of the largest B2B networking events in the cyber industry, outside of the United States. Every year, the event attracts thousands of attendees, mainly C-level executives, investors, professionals, and government officials from all over the…

How to prioritize IT security projects

If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to remediate. It’s enough to make you throw your hands up and wonder where to…

How industries are evolving their DevOps and security practices

There’s significant variation in DevOps maturation and security integration across the financial services, government, retail, telecom, and technology industries, according to Puppet’s report based on nearly 3,000 responses. “Integrating security into your DevOps practices can be challenging, but when done…

Critical RCE flaw in OpenSMTPD, patch available

Qualys researchers have discovered a critical vulnerability (CVE-2020-7247) in OpenBSD’s OpenSMTPD mail server, which can allow attackers to execute arbitrary shell commands on the underlying system as root. “We developed a simple proof of concept and successfully tested it against…

2020: A year of deepfakes and deep deception

Over the past year, deepfakes, a machine learning model that is used to create realistic yet fake or manipulated audio and video, started making headlines as a major emerging cyber threat. The first examples of deepfakes seen by the general…

Are businesses prepared for an extinction-level cyber event?

In an era of technological transformation and cyber everywhere, the attack surface is exponentially growing as cyber criminals attack operational systems and backup capabilities simultaneously in highly sophisticated ways leading to enterprise-wide destructive cyberattacks, a Deloitte survey reveals. Majority of…

Cequence CQ botDefense now available on AWS Marketplace as a SaaS

Cequence Security announced that its Application Security Platform (ASP) with CQ botDefense is now available as a Software-as-a-Service (SaaS) offering hosted on Amazon Web Services (AWS). The solution allows customers to protect public-facing applications from online fraud caused by automated…

Björn Lidefelt joins HID Global as CEO

HID Global, a worldwide leader in trusted identity solutions, announces Björn Lidefelt has been named President and CEO. Björn joins the company after serving as Chief Commercial Officer (CCO) at HID parent company ASSA ABLOY, where he oversaw branding, communications,…

Trustmark appoints Britt Lindley as its new CISO

Trustmark Mutual Holding Company, a national employee benefits provider, has selected Britt Lindley as its new Chief Information Security Officer (CISO). Bradley Bodell, Chief Information Officer, made the announcement. “Britt’s deep breadth of leadership experience, his proven track record of…

Security risks for e-scooters and riders exposed

Micromobility vehicles, such as e-scooters, zip in and out of traffic. For this reason, micromobility is seen as an alleviating trend to help tackle traffic congestion. However, a research out of UTSA finds e-scooters have risks beyond the perils of…

Cymatic selects security experts for advisory roles

Cymatic announced the launch of its advisory board, a community of international security and risk experts providing brand counsel, technical guidance, and market leadership to ensure the success and relevance of the Cymatic next-generation all-in-one web application defense platform. Cymatic…

Sixgill appoints Meira Primes as chief marketing officer

Sixgill, a leading threat intelligence company, has appointed Meira Primes, a veteran strategist and marketer, as chief marketing officer. The appointment comes as Sixgill announced it is moving into larger offices to support growth as the company continues to capitalize…

Top 10 policy trends to watch for globally in 2020

The 10 top trends that will drive the most significant technological upheavals this year have been identified by Access Partnership. “Shifts in tech policy will disrupt life for everyone. While some governments try to leverage the benefits of 5G, artificial…

Over half of organizations were successfully phished in 2019

Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end users, a Proofpoint survey reveals. Seventy-eight percent also reported that security awareness training activities resulted in…