Tag: Help Net Security

Organizations weigh the risks and rewards of using AI

78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. Organizations prioritize AI risk assessment The report, based on a survey of over 400 security professionals in the US involved in…

New infosec products of the week: July 5, 2024

Here’s a look at the most interesting products from the past week, featuring releases from LogRhythm, NordVPN, Regula, and Scythe. LogRhythm’s enhancements boost analyst efficiency This quarter, LogRhythm is highlighting its Machine Data Intelligence (MDI) Fabric for the AI-ready Security…

4 key steps to building an incident response plan

In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses the components of an effective security incident response strategy and how they work together to ensure organizations can address cybersecurity issues. What are the…

Organizations use outdated approaches to secure APIs

Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites, according to Cloudflare. The report underscores that the volume of threats stemming from issues…

Only 13% of organizations are cyber mature

A staggering 83% of organizations have suffered a material security breach recently, with over half occurring in the past year alone, underscoring the critical need for advanced preparedness and agile response strategies, according to Commvault. For security and IT professionals,…

Maintaining human oversight in AI-enhanced software development

In this Help Net Security, Martin Reynolds, Field CTO at Harness, discusses how AI can enhance the security of software development and deployment. However, increased reliance on AI-generated code introduces new risks, requiring human oversight and integrated security practices to…

Cybersecurity jobs available right now: July 3, 2024

CISO Atera | Israel | On-site – View job details The CISO will oversee our company’s information, cyber, and technology security and will have end to end full responsibility developing, implementing, and enforcing security policies, procedures, and protocols to protect…

Secator: Open-source pentesting Swiss army knife

Secator is an open-source task and workflow runner tailored for security assessments. It facilitates the use of numerous security tools and aims to enhance the efficiency of pen testers and security researchers. Secator features Curated list of commands Unified input…

Deepwatch appoints John DiLullo as CEO

Deepwatch announced that John DiLullo has been appointed as CEO, succeeding Charlie Thomas who is retiring and will serve as chairman of the Board of Directors, effective immediately. John DiLullo is a veteran of the cybersecurity industry with more than…

NordVPN File Checker protects users from infected files

NordVPN launches its third experimental product from the NordLabs platform. File Checker is an online tool that scans different types of files for malware and viruses. It helps to prevent malicious codes invading user’s devices through infected or corrupted files…

LogRhythm’s enhancements boost analyst efficiency

LogRhythm announced its 9th consecutive quarterly release. In the AI-ready world, LogRhythm empowers security teams with the highest integrity data in the security industry to enhance the output of the AI tools used to defend organizations from cyberthreats. Coupled with…

Leveraging no-code automation for efficient network operations

In this Help Net Security interview, Lingping Gao, CEO at NetBrain, discusses the challenges NetOps teams face in maintaining production services due to outdated processes and growing infrastructures. No-code automation has the potential to address these challenges by allowing engineers…

Inside the minds of CISOs

In this Help Net Security video, Nick McKenzie, CISO of Bugcrowd, discusses the key findings from their recent report, which comes at a crucial time as security leaders’ roles are being discussed more with the current risk landscape and the…

SCYTHE 4.3 enables organizations to test and validate their defenses

SCYTHE has announced SCYTHE 4.3, which brings a host of enhancements designed to support and advance cybersecurity teams’ capabilities in threat emulation, vulnerability management, and security integration. SCYTHE 4.3 new features summary SCYTHE 4.3 introduces several new features for cybersecurity…