Akamai announced that it is extending its segmentation solution, Akamai Guardicore Segmentation, to hybrid cloud environments. Extending Akamai Guardicore Segmentation to the cloud helps reduce attack surfaces and helps contain attacks targeting cloud-native workloads. Network security professionals can seamlessly manage…
Tag: Help Net Security
AgileBlue Sapphire AI streamlines SecOps and SOAR processes
AgileBlue announced the availability of Sapphire AI in its Cerulean XDR|SOAR platform. The advanced AI system reinforces the company’s commitment to customer excellence, serving as the first line of defense against a cyberattack. With cyber threats evolving at an alarming…
White House: Use memory-safe programming languages to protect the nation
The White House is asking the technical community to switch to using memory-safe programming languages – such as Rust, Python, Swift, C#, Java, and Go – to prevent memory corruption vulnerabilities from entering the digital ecosystem. According to a recent…
AU10TIX KYB solution validates info against global registries and jurisdictions
AU10TIX launched an Know Your Business (KYB) solution that enables companies to know exactly who they are doing business with and avoid potential financial and reputational losses. By combining KYB with Know Your Customer (KYC) processes, the offering addresses every…
Legato Security Ensemble helps organizations prevent breaches
Legato Security launched Ensemble, a security operations platform that is poised to redefine how organizations detect, manage, and respond to threats. Ensemble empowers organizations to optimize their security investments by unifying threat detection, providing context, and offering the visibility necessary…
Meta plans to prevent disinformation and AI-generated content from influencing voters
Meta, the company that owns some of the biggest social networks in use today, has explained how it means to tackle disinformation related to the upcoming EU Parliament elections, with a special emphasis on how it plans to treat AI-generated…
APT29 revamps its techniques to breach cloud environments
Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five Eyes intelligence alliance have warned. About APT29 APT29 (aka Midnight Blizzard, aka Cozy Bear) is a cyber espionage group believed…
Bitwarden Secrets Manager integrates with Ansible Playbook
Bitwarden enhanced Bitwarden Secrets Manager by integrating with Ansible Playbook. This out-of-the-box integration enables developers and DevOps teams to securely streamline their server deployment processes using zero knowledge end-to-end encryption to enhance their security posture. The need for speed in…
Octopus Deploy acquires Codefresh to drive innovation in continuous delivery
Octopus Deploy announced the acquisition of Codefresh. Codefresh, founded in 2014 by Oleg Verhovsky and Raziel Tabib, is Argo maintainer and leader in Kubernetes CD, GitOps, and CI. The acquisition marks a significant milestone as Octopus strengthens its support for…
NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure
The National Institute of Standards and Technology (NIST) has updated its widely utilized Cybersecurity Framework (CSF), a key document for mitigating cybersecurity risks. The latest version, 2.0, is tailored to cater to a broad range of audiences, spanning various industry…
Using AI to reduce false positives in secrets scanners
As development environments grow more complex, applications increasingly communicate with many external services. When a software development project communicates with an external service, it utilizes a token or “secret” for authentication. These tokens are the glue that keeps any modern…
Overcoming the pressures of cybersecurity startup leadership
In this Help Net Security interview, Kunal Agarwal, CEO at Dope Security, offers a look into the CEO’s leadership philosophy, the process of building a high-caliber team, and the unique challenges of navigating a startup in the tech industry. Dope…
Enterprises’ progress in digital trust implementation is far from great
A growing divide separates leaders with a firm grasp on digital trust from those at the bottom of the pool, according to DigiCert. While digital trust overwhelmingly remains a critical focus for all enterprises, the latest report from DigiCert shines…
Does AI remediation spell the end for developers in 2024?
Big tech firms are already rolling out AI remediation tools to prevent developers from introducing security risks into the software development lifecycle (SDLC). In this Help Net Security video, Matias Madou, CTO at Secure Code Warrior, discusses how AI remediation…
Unmanaged third-party access threatens OT environments
Many industrial organizations lack the resources, expertise, and collaborative processes to effectively mitigate threats and ensure secure access to operational technology (OT) systems, according to Cyolo. Ensuring secure access to OT environments is about more than just cybersecurity. These environments…
Bitdefender Cryptomining Protection detects malicious cryptojacking attempts
Bitdefender announced Cryptomining Protection, a cryptomining management feature that allows users to both protect against malicious cryptojacking and manage their own legitimate cyptomining initiatives on their Windows PCs. According to a 2023 report, cryptojacking attacks have increased nearly 400% year…
DataVisor introduces fraud and risk solution for financial institutions
DataVisor launched a solution designed to both detect fraud and financial crimes more effectively and to uphold sponsor bank compliance in the face of evolving regulations for Banking-as-a-Service (BaaS) offerings. As the fintech industry continues to rapidly evolve amidst a…
LockBit leak site is back online
LockBitSupp, the individual running the LockBit ransomware-as-a-service operation, has made good on one promise: the LockBit leak site is back online on backup domains, with lists of victims expected to be unveiled in the coming days. Law enforcement strikes LockBit…
NetSTAR PhishCompass combats phishing threats
NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass. This innovative AI-supported solution marks a significant milestone in the ongoing battle against phishing threats and attacks, tailored for a wide range of industry sectors including security,…
Palo Alto Networks empowers customers with integrated private 5G solutions
Palo Alto Networks announced end-to-end private 5G security solutions and services in collaboration with leading Private 5G partners. Bringing together Palo Alto Networks enterprise-grade 5G Security and Private 5G partner integrations and services allows organizations to easily deploy, manage, and…