Automated attacks on application business logic, carried out by sophisticated bad bots, were the leading threat for online retailers, according to Imperva. In addition, account takeover, DDoS, API abuse, and client-side attacks were significant risks. The ecommerce industry remains a…
Tag: Help Net Security
LogicMonitor expands LM Envision platform to simplify multi-cloud complexities for CloudOps teams
LogicMonitor announced the extension of its LM Envision platform for CloudOps, optimizing how teams monitor hybrid and multi cloud environments. With leaders recently describing their monitoring tools as “chaotic,” the latest capabilities empower CloudOps teams to quickly identify problems, prevent…
NodeSource launches N|Solid Copilot to streamline app development
NodeSource has launched the N|Solid Copilot, an AI assistant integrated into the Console of N|Solid Pro. Leveraging the N|Solid Pro platform to capture the telemetry for applications and paired with the company’s Node.js experts and OpenAI, the N|Solid Copilot creates…
Photos: IRISSCON 2023
IRISSCON, the annual cybercrime-themed conference organized by the Irish Reporting and Information Security Service (IRISS), was held in Dublin, Ireland, on November 16, 2023. Here’s a peak on what went down: Deryck Mitchelson, Check Point Rik Ferguson, Forescout Networking Dave…
42Crunch and Microsoft partner for streamlined API security governance
42Crunch has unveiled the integration of 42Crunch’s API security audit and vulnerability testing solution with Microsoft Defender for Cloud to provide Microsoft customers continuous API protection from design to runtime. Cloud applications are increasingly API-centric, with APIs at the core…
Cohesity expands partnership with Microsoft to improve data restore capabilities for organizations
Cohesity announced it has deepened its relationship with Microsoft to help organizations more quickly respond to and recover from data loss within Microsoft 365 environments. For years, Cohesity and Microsoft have offered solutions for high-speed backup and recovery. This includes…
Crunchy Data and Center for Internet Security help businesses secure Postgres deployments
Crunchy Data in collaboration with the Center for Internet Security, announced the publication of the PostgreSQL CIS Benchmark for PostgreSQL 16. Crunchy Data worked with the Defense Information Systems Agency (DISA) to make PostgreSQL the first open source database to…
Telemetry gaps leave networks vulnerable as attackers move faster
Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide their tracks. Gaps in telemetry decrease much-needed visibility into organizations’ networks…
From PKI to PQC: Devising a strategy for the transition
Quantum computers capable of breaking currently used encryption algorithms are an inevitability. And since the US, China and Europe are sprinting to win that arms race, we know that day is coming sooner rather than later. Will organizations be ready…
Review: Cyberbunker: The Criminal Underworld
Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that enabled the proliferation of dark web forums where illegal materials were bought and sold. Cyberbunker: The Criminal Underworld The documentary…
Cyber insurance predictions for 2024
In this Help Net Security video, Dara Gibson, Senior Cyber Insurance Manager at Optiv, discusses cyber insurance and what we should expect to see in 2024: Ransomware, BEC, and pixel privacy claims will remain at the forefront of cyber insurance…
AI helps leaders optimize costs and mitigate risks
AI is dominating the mindshare of IT leaders this year and next, as 72% believe their organization will be using more AI in the next two to three years, according to Snow Software. While AI may be the top priority…
The new imperative in API security strategy
Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational pillars of API security, according to Wallarm. Prioritizing AAA principles Open authentication (OAuth), single-sign on (SSO) and JSON Web Token…
Next DLP and Torq join forces to automate insider risk detection and response
Next DLP has unveiled a strategic partnership with Torq designed to combat insider risk through heightened detection and automated response actions. Electric adventure vehicle company Rivian will leverage the deep visibility provided by the joint solution to shine a light…
AppViewX SIGN+ strengthens software supply chain security
AppViewX launched AppViewX SIGN+, a flexible and secure code signing solution that enables DevOps teams to secure their software supply chain. With multiple deployment options, including code signing as a service, AppViewX SIGN+ seamlessly integrates into DevOps processes to enable…
Devo Collective Defense empowers security teams with community-driven threat intelligence
Devo Technology has launched Devo Collective Defense, a threat intelligence feed within the Devo Security Data Platform that provides community-based intelligence sharing of threat activity and trends. Devo is also unveiling updates to Devo Exchange and its MITRE ATT&CK Adviser…
Entrust Verified Signing authenticates individuals in digital transactions
Entrust has introduced Entrust Verified Signing, a comprehensive solution designed to raise the level of trust and assurance in vital digital transactions and agreements. The Entrust Verified Signing solution integrates identity verification and identity and access management (IAM) with digital…
Tanium and ServiceNow partner for complete asset visibility
Tanium and ServiceNow partnership provides complete asset visibility by combining Tanium’s real-time endpoint data and remediation with ServiceNow IT operations and security workflows. These two platforms empower automation across the entire estate, providing customers with a complete and accurate Configuration…
LastPass simplifies access to user data and information
LastPass announced the rollout of a new vault user interface (UI) on its iOS and Android mobile applications providing all users with easier, more streamlined access to data in their vaults. These changes unify the user experience with a modernized…
Keysight Elastic Network Generator facilitates collaborative and flexible network continuous validation
Keysight Technologies has introduced a first in its class advancement in network testing with the new Keysight Elastic Network Generator (KENG) software – an agile, composable network test platform based on open vendor-neutral API and designed for continuous integration (CI).…