Nearly 22 years after Bill Gates announced a concerted Microsoft-wide push to deliver Trustworthy Computing, the company is launching the Secure Future Initiative, to boost the overall security of Microsoft’s products and its customers and users. A new Microsoft initiative…
Tag: Help Net Security
How cybercriminals adapt and thrive amidst changing consumer trends
The email threat landscape is experiencing a profound transformation, adapting to new challenges and exploiting emerging vulnerabilities with speed and sophistication. In this Help Net Security video, Usman Choudhary, CPTO at VIPRE Security Group, discusses how cybercriminals modify their tactics…
New infosec products of the week: November 3, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Action1, Enzoic, Immuta, and Snappt. Immuta Discover identifies and classifies sensitive data Immuta Discover automatically and continuously discovers structured data in cloud data platforms. It…
Healthcare’s road to redefining cybersecurity with modern solutions
The rate of data encryption following a ransomware attack in healthcare was the highest in the last three years, according to Sophos. Ransomware attacks continue to grow in sophistication Among those organizations surveyed, cybercriminals successfully encrypted data in nearly 75%…
Financial organizations embrace automation for enhanced security
The security performance of financial applications generally outperforms other industries, with automation, targeted security training, and scanning via Application Programming Interface (API) contributing to a year-over-year reduction in the percentage of applications containing flaws, according to Veracode. Against a backdrop…
AI is transforming financial crime compliance
While 86% of compliance, operations, risk and IT professionals at banks and non-banking financial institutions (NBFIs) surveyed said they would increase spending on AI and ML over the next two years, a 93% of respondents said that instead of using…
Nebulon Medusa2 SPU unifies storage, cyber and networking services
Nebulon announced its next-generation Medusa2 SPU. It is the only converged infrastructure data processing unit (DPU) to unify storage, cyber and networking services on a secure, cloud-managed, server-embedded PCIe card. The Medusa2 SPU marks the first-time enterprises and service providers…
OneSpan Trust Vault protects documents against emerging technologies and security threats
OneSpan announced a new capability to its e-signature solution, OneSpan Sign, to give organizations a better way to safeguard the provenance of a document against emerging security threats. The newest addition to OneSpan’s portfolio, Trust Vault, helps guarantee the integrity…
Thentia introduces AI-powered Data Migration Accelerator for seamless transitions
Thentia has launched Data Migration Accelerator (DMA), a new service offering that leverages artificial intelligence to empower its customers to seamlessly migrate their data to its all-encompassing regulatory platform, Thentia Cloud. Beyond data migration, DMA offers ongoing data management –…
Snappt Identity Verification allows property managers to detect fraudulent applicants
Snappt has launched Snappt Identity (ID) Verification to verify prospective tenants. This new offering is now a part of Snappt Pro, the company’s all-in-one solution for fraud detection and identity verification. Snappt has spent the past four years helping the…
Enzoic unveils BIN Monitoring to reduce credit card fraud
Enzoic released its Payment Card BIN Monitoring service designed to help banks and credit unions prevent card fraud through real-time exposure data. The solution harnesses Enzoic’s proprietary Dark Web intelligence to scan for credit and debit cards associated with financial…
Claroty and Rockwell Automation expand capabilities with SaaS-powered OT security solution
Claroty has unveiled an expansion of its capabilities in collaboration with Rockwell Automation by adding the SaaS-powered industrial cybersecurity platform Claroty xDome to Rockwell Automation’s global services portfolio. Additionally, Rockwell Automation customers now have access to Claroty’s complete suite of…
Attackers exploiting Apache ActiveMQ flaw to deliver ransomware (CVE-2023-46604)
Ransomware-wielding attackers are trying to break into servers running outdated versions of Apache ActiveMQ by exploiting a recently fixed vulnerability (CVE-2023-46604). “Beginning Friday, October 27, Rapid7 Managed Detection and Response (MDR) identified suspected exploitation of Apache ActiveMQ CVE-2023-46604 in two…
SAIC evolves its AI and ML ecosystem to improve government mission outcomes
SAIC announced new offerings for Tenjin and additional features for Koverse. “The new offerings and features for SAIC’s Data Science Suite ensure the right people have access to the right data at the right time to gain actionable insights for…
Action1 platform updates automate vulnerability remediation
Action1 announced its latest release. Global enterprises navigating complex environments can now ensure rapid adoption of Action1’s platform within their organization for reduced Mean-Time-To-Remediate (MTTR) while eliminating gaps in their remediation processes. Key features: Automation and cost savings. Enterprises can…
F5 BIG-IP vulnerabilities leveraged by attackers: What to do?
The two BIG-IP vulnerabilities (CVE-2023-46747, CVE-2023-46748) F5 Networks has recently released hotfixes for are being exploited by attackers in the wild, the company has confirmed. “It is important to note that not all exploited systems may show the same indicators,…
MITRE ATT&CK v14 released
MITRE has released MITRE ATT&CK v14, the newest iteration of its popular investigation framework / knowledge base of tactics and techniques employed by cyber attackers. MITRE ATT&CK v14 ATT&CK’s goal is to catalog and categorize behaviors of cyber adversaries in…
6 steps to accelerate cybersecurity incident response
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must be able to stop threats and restore normal operations as…
Cybersecurity workforce shortages: 67% report people deficits
The global cybersecurity workforce has reached 5.5 million people, an 8.7% increase from 2022, representing 440,000 new jobs, according to ISC2. While this is the highest workforce ever recorded, the report shows that demand is still outpacing the supply. The…
How human behavior research informs security strategies
In this Help Net Security interview, Kai Roer, CEO at Praxis Security Labs, explores the theoretical underpinnings, practical implications, and the crucial role of human behavior in cybersecurity. Roer explains why a comprehensive understanding of human complexity is paramount in…