Elastic has unveiled Elasticsearch Query Language (ES|QL), its new piped query language designed to transform, enrich and simplify data investigation with concurrent processing. ES|QL enables site reliability engineers (SREs), developers and security professionals to perform data aggregation and analysis across…
Tag: Help Net Security
Protecto raises $4 million to empower enterprises with trusted AI
Protecto announced the close of a $4 million seed funding round. Together Fund led the round with participation from Better Capital, FortyTwo VC, Arali Ventures and Speciale Invest. The latest round brings the total raised to $5 million after Protecto…
ThreatX enhances API and app protection for containerized environments
ThreatX has unveiled new capabilities for its Runtime API and Application Protection (RAAP) solution. ThreatX RAAP helps CISOs and security teams extend APIs and app protection to containerized environments. ThreatX delivers this capability through a unified solution that protects against…
Druva introduces Azure VM backup and recovery capabilities
Druva announced cloud-native protection for Azure backups, enabling customers to leverage the simplicity and value of SaaS across their cloud deployments. Druva’s 100% agentless, cloud-native SaaS solution provides air-gapped backups for Azure VMs and reduces total cost of ownership by…
SUSE boosts cloud native portfolio to enhance customer productivity
SUSE released Rancher Prime 2.0, enhancing customers’ ability to manage heterogeneous, multi-cloud Kubernetes deployments securely and at scale. SUSE also revealed updates to Rancher community edition, SLE Micro 5.5 and the future of SUSE Edge. The latest updates continue to…
Sumo Logic discloses potential breach via compromised AWS credential
Cloud-native big data and security analytics firm Sumo Logic is investigating a potential security incident within their platform, the company revealed on Tuesday. The Sumo Logic incident “On Friday, November 3rd, 2023, Sumo Logic discovered evidence of a potential security…
LastPass and Acronis join forces to strenghten password protection for MSPs
LastPass and Acronis announced a partnership to provide password management integration for managed service providers (MSPs) using Acronis Cyber Protect Cloud, an all-in-one data and cybersecurity protection platform. The integration, accessible from the Acronis Cyber Protect Cloud marketplace, will enable…
Marina Bay Sands breach exposed data of 665,000 customers
Singapore-based luxury resort and casino Marina Bay Sands has suffered a data breach that exposed data of 665,000 non-casino rewards program members. The Marina Bay Sands data breach “Marina Bay Sands became aware of a data security incident on 20…
The 3 key stages of ransomware attacks and useful indicators of compromise
For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we will dive into those…
Aqua Trivy open-source security scanner now finds Kubernetes security risks
The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the components within their Kubernetes environment and how secure they are to reduce risk. “Aqua Trivy…
AI-assisted coding and its impact on developers
The emergence of AI has put into question the roles of software developers everywhere. In this Help Net Security video, Cat Hicks, VP of Research Insights at Pluralsight, discusses pressing questions that engineering organizations face regarding the rapidly-changing possibilities of…
Companies have good reasons to be concerned about generative AI
Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data security, and more, according to Portal26. Two-thirds of respondents admitted to a Generative AI security or misuse…
Uphold Linux systems’ performance and availability in Azure
Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your cloud environments. Let’s take the following three cloud computing benefits as examples. Rapidly scale cloud services: In the absence of…
Uptycs provides unified supply chain and runtime security for Kubernetes
Uptycs has unveiled new automated code and runtime protections to help security and development teams align on policies, enforce them anywhere, and define remediation workflows — all from a single console. DevSecOps teams can now automate shift-left security controls using…
Bitwarden launches passkey management for passwordless authentication across accounts
Bitwarden has launched passkey management, enabling every user to create, manage, and store passkeys in their vaults. Users can now quickly and securely log into passkey-enabled websites through the Bitwarden web extension. The synchronized passkeys are encrypted in users’ vaults…
Varonis enhances its Microsoft 365 offering to prevent sensitive email exposure
Varonis announced major enhancements to its Microsoft 365 offering, adding more robust capabilities to continuously detect and prevent exposures in the world’s top cloud-based email service. With this release, Varonis extends its patented data classification technology to email messages, attachments,…
NETSCOUT releases Adaptive DDoS Protection for AED
NETSCOUT launched Adaptive DDoS Protection for Arbor Edge Defense (AED) to protect ISPs and enterprises from DNS water torture attacks. According to the NETSCOUT DDoS Threat Intelligence Report, Domain Name System (DNS) water torture attacks increased 353% in the first…
IRONSCALES expands platform capabilities to improve employee phishing awareness
IRONSCALES announced its Fall ’23 Release, strengthening its foundational behavioral analysis with deep image-based detection capabilities to stop email attacks that bypass text analysis such as QR code phishing attacks (or quishing). Additionally, IRONSCALES released phishing simulation testing enhancements with…
Kentik Kube collects metadata across Kubernetes pods, clusters, and services
Kentik, the network observability company, has released Kentik Kube, a solution that reveals how Kubernetes traffic routes through organizations’ data centers, clouds, and the internet. Kentik Kube gives network, cloud, and infrastructure engineers detailed network traffic and performance visibility, both…
Sumo Logic launches HELM Chart V4 to unify data collection on Kubernetes clusters
Sumo Logic has launched its HELM Chart V4 feature to fully unify data collection as part of its continued commitment to OpenTelemetry (OTel). Organizations can now package, configure and deploy applications and services on Kubernetes clusters with OpenTelemetry as a…