Devo Technology has launched Devo Collective Defense, a threat intelligence feed within the Devo Security Data Platform that provides community-based intelligence sharing of threat activity and trends. Devo is also unveiling updates to Devo Exchange and its MITRE ATT&CK Adviser…
Tag: Help Net Security
Entrust Verified Signing authenticates individuals in digital transactions
Entrust has introduced Entrust Verified Signing, a comprehensive solution designed to raise the level of trust and assurance in vital digital transactions and agreements. The Entrust Verified Signing solution integrates identity verification and identity and access management (IAM) with digital…
Tanium and ServiceNow partner for complete asset visibility
Tanium and ServiceNow partnership provides complete asset visibility by combining Tanium’s real-time endpoint data and remediation with ServiceNow IT operations and security workflows. These two platforms empower automation across the entire estate, providing customers with a complete and accurate Configuration…
LastPass simplifies access to user data and information
LastPass announced the rollout of a new vault user interface (UI) on its iOS and Android mobile applications providing all users with easier, more streamlined access to data in their vaults. These changes unify the user experience with a modernized…
Keysight Elastic Network Generator facilitates collaborative and flexible network continuous validation
Keysight Technologies has introduced a first in its class advancement in network testing with the new Keysight Elastic Network Generator (KENG) software – an agile, composable network test platform based on open vendor-neutral API and designed for continuous integration (CI).…
Viavi Solutions XhaulAdvisor accelerates O-RAN interoperability testing
Viavi Solutions announced the expansion of its NITRO Wireless portfolio with the addition of XhaulAdvisor, a scalable software solution offering real-time data for fronthaul verification, analysis, emulation and channel utilization. XhaulAdvisor enables Open RAN vendors, operators and OTIC labs to…
Veeam Backup for Salesforce v2 protects against data loss and corruption
Veeam Software has launched Veeam Backup for Salesforce v2, available on Salesforce AppExchange. Veeam Backup for Salesforce eliminates the risks of Salesforce data and metadata loss from human, integration, and corruption errors. This newest version from Veeam extends support for…
Living Security collaborates with Zscaler to manage human risk
Living Security announced a new partnership and technology integration with Zscaler. Joint customers will realize the benefits of secure internet and SaaS access, secure private access, and human risk quantification, enabling them to reduce risk. The majority of cybersecurity incidents…
TrustArc’s enhancements improve AI risk management for enterprises
TrustArc announced significant enhancements across its portfolio of products within the TrustArc Privacy Management Platform designed to enable organizations to implement accountable AI data privacy governance. As AI and machine learning continue to drive innovation and reshape numerous businesses, operations,…
ThreatModeler 7.0 brings AI to threat modeling
ThreatModeler released ThreatModeler, Version 7.0, bringing several new capabilities, including ThreatModeler WingMan (AI assistant), to help streamline the threat modeling process for software security and DevOps teams. ThreatModeler 7.0 enables faster and more consistent threat modeling with features such as…
Resecurity enhances cybersecurity in the Middle East
In a significant stride towards fortifying the cybersecurity landscape in the Middle East, Resecurity introduced its Digital Identity Protection (IDP) solution. This strategic move aligns with Resecurity’s commitment to creating a safer digital society and empowering individuals and businesses in…
Radiant Security raises $15 million to expand engineering and go-to-market capacity
Radiant Security announced the successful closure of a $15 million Series A funding round. This strategic financing, led by Next47, reaffirms the soaring demand for AI-based solutions that address the longstanding challenges faced by Security Operations Centers (SOCs). In addition…
HARmor: Open-source tool for sanitizing and securing HAR files
HARmor is an open-source tool that sanitizes HTTP Archive files. Easy to install and run, it enables the safe handling and sharing of HAR files. What are HAR files? HAR files are critical for support teams working to debug and…
Crypto asset discovery and the post-quantum migration
Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google recently demonstrated the power of quantum computers by solving a problem in seconds that today’s supercomputers require nearly 50 years…
Enhancing mainframe security with proven best practices
Mainframe systems have served as the bedrock of enterprise networks for years, standing unmatched in terms of reliability, scalability, and data protection. However, security risks have become a pressing concern as the digital landscape evolves, emerging practices like DevOps, the…
Modeling organizations’ defensive mechanisms with MITRE D3FEND
Funded by the National Security Agency, MITRE’s D3FEND framework is helping to provide standardization, specificity, and repeatability needed by cybersecurity engineers. As the framework moves from the beta version to version 1.0 in 2024, we asked D3FEND creator Peter Kaloroumakis…
Organizations should prepare for the inevitability of cyberattacks on their infrastructure
Organizations reliance on technology has contributed to the fact that their attack surface has grown in size and complexity, according to Armis. Global organizations are facing an unprecedented level of cyber risk due to blind spots in their environment and…
Generative AI is shaping future incident management processes
Persistent challenges in adhering to established incident management processes pose a significant risk to organizations, amplifying potential downtime costs amidst a surge in service incidents, according to Transposit. Despite a majority of respondents (59.4%) who have a defined incident management…
Product showcase: Nudge Security’s SaaS security and governance platform
In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies whenever and wherever they need. While this has been a critical boon to productivity and innovation in the…
Danish energy sector hit by a wave of coordinated cyberattacks
The Danish energy sector has suffered what is believed to be the most extensive cyberattack in Danish history, according to SektorCERT. Danish energy sector under attack SektorCERT, an organization owned and funded by Danish critical infrastructure (CI) companies, uses a…