Skybox Security announced the next generation of its Security Posture Management Platform – including a Software-as-a-Service (SaaS) solution for Security Policy and Vulnerability Management. Propelling its global customer base into the next era of proactive cybersecurity, major innovations advance its…
Category: Help Net Security
ControlMap Trust Portal creates compliance alignment across departments and teams
ControlMap has launched the Trust Portal — an interface for users to share valuable security information, data, and status with customers. With this new feature, ControlMap supports its mission to help organizations boost their revenue and win new opportunities, especially…
Immuta platform enhancements boost data security across key cloud platforms
Immuta has released its latest product enhancements and integrations designed to deliver data security and monitoring across key cloud platforms at scale. These new features include native integration with Google BigQuery, expanded integrations with Snowflake, including external OAuth support, audit…
Gigamon GigaVUE 6.0 provides IT teams with actionable network-level intelligence
Gigamon has released expansive set of new capabilities to the Gigamon Hawk Deep Observability Pipeline. GigaVUE 6.0, the software powering Gigamon Hawk, democratizes security delivery across networking, security, and cloud operations teams while reducing cross-platform cost and complexity. Gigamon Hawk…
Venafi Control Plane for Machine Identities enables users to reduce security risk
Venafi unveiled the Venafi Control Plane for Machine Identities, unifying machine identity management across all identity types: in data centers, cloud, hybrid environments and at the edge. The Venafi Control Plane enables customers to accelerate digital transformation, increase development speed,…
Portnox unveils IoT fingerprinting and profiling solution to address rising IoT security threats
Portnox released a cloud-native IoT security solution to help mid-market and enterprise businesses address rising Internet of Things (IoT) security threats. Now available via the Portnox Cloud, Portnox’s new IoT fingerprinting and profiling capabilities empower organizations to identify, authenticate, authorize,…
Keysight Vision 400 Series Network Packet Brokers eliminate blind spots in high-speed networks
Keysight Technologies has released new Vision 400 Series Network Packet Brokers to deliver visibility in high-speed 400G hybrid networks. Networks are gaining speed and complexity to support hybrid IT networks and multi-cloud business deployments for applications such as 5G, remote…
ServiceNow integrates Infobip solutions to enhance customer experience
Infobip has integrated with ServiceNow to provide enhanced messaging capabilities for ServiceNow customers. The integration improves the customer experience by using two-way messaging for customer support, resulting in faster response times, consistent messaging, and increased customer satisfaction. Business messaging continues…
Safe Security and Intuitive.Cloud join forces to provide visibility into enterprise-wide cyber risk
Safe Security joins forces with Intuitive.Cloud (Intuitive). Intuitive’s new offering, a cyber risk quantification and management solution for its global enterprise customers, will deliver the SAFE CRQM platform to U.S.-based customers. Regulatory and government pressure is forcing Boards and C-Suites…
Accenture and Google Cloud expand collaboration to develop new solutions using data and AI
Accenture and Google Cloud have expanded their global partnership through a renewed commitment to growing their respective talent, increasing their joint capabilities, developing new solutions using data and AI, and providing enhanced support to help clients build a strong digital…
PlainID joins Identity Defined Security Alliance to help organizations reduce risk
PlainID is now a member of the Identity Defined Security Alliance (IDSA), a vendor-neutral resource for organizations focused on securing digital identities to reduce the risk of an identity-related breach. “Joining IDSA was a perfect fit for PlainID,” said Tom…
Appgate partners with Illumio to reduce risk across hybrid infrastructure
Appgate and Illumio have announced the integrated Zero Trust Network Access (ZTNA) and Zero Trust Segmentation (ZTS) solution that protects network connectivity and stops breaches from spreading across hybrid infrastructures and applications to make organizations more resilient to cyberattacks. The…
GitLab and Google Cloud launch Cloud Seed to accelerate cloud adoption
GitLab launched Cloud Seed in partnership with Google Cloud. Cloud Seed is a new capability within GitLab that simplifies the developer experience for procuring and consuming cloud services. Cloud Seed allows GitLab and Google Cloud customers to migrate to the…
Immersive Labs raises $66 million and expands its management team
Immersive Labs raised $66 million in capital to continue its growth and investment in its Cyber Workforce Resilience platform. Ten Eleven Ventures led the latest raise supporting the company’s efforts to help organizations around the world assess, build, and prove…
Stairwell raises $45 million to secure organizations against emerging malware threats
Stairwell announced a $45M Series B capitalization. The funding round was led by Section 32, with additional investments from Sequoia Capital, Accel, Lux Capital, Gradient Ventures, and angel investors Eric Schmidt and Michael Ovitz. This brings Stairwell’s total funding to…
F5 appoints Marianne Budnik to Board of Directors
Marianne Budnik has joined F5’s board of directors, effective immediately. She is an accomplished leader, with extensive marketing and cybersecurity expertise, as well as more than 25 years’ operating experience in the technology sector. “Marianne’s leadership in high-growth cybersecurity, networking…
Splunk adds Richard P. Wallace and David Tunnell to Board of Directors
Splunk has unveiled that Richard P. Wallace and David Tunnell have been appointed to the Splunk Board of Directors, effective immediately. “I’m pleased to welcome Rick and David as our newest additions to the Splunk Board,” said Graham Smith, Chair…
Vista Equity Partners acquires KnowBe4 for $4.6 billion in cash
KnowBe4 has entered into a definitive agreement to be acquired by Vista Equity Partners in an all-cash transaction valued at approximately $4.6 billion on an equity value basis. “As a trusted partner to enterprise software companies around the world, we…
Vista Equity Partners announces to acquire KnowBe4 in $4.6 billion deal
KnowBe4 announced that it has entered into a definitive agreement to be acquired by Vista Equity Partners in an all-cash transaction valued at approximately $4.6 billion on an equity value basis. “As a trusted partner to enterprise software companies around…
Why paying the ransom is a mistake
New research from Databarracks reveals 44% of organizations that suffered a ransomware attack, paid the ransom. 34% recovered from backups, while 22% used ransomware decryption tools. The findings come from the Databarracks 2022 Data Health Check. This Help Net Security…
Constellation: Open-source, runtime-encrypted Kubernetes
Confidential Computing is a hardware-based technology that shields computer workloads from their environments and keeps data encrypted during processing. In this Help Net Security video, Felix Schuster, CEO at Edgeless Systems, talks about the open-source release of Constellation. Constellation allows…
How to improve employees’ cybersecurity behavior
We already have cybersecurity behaviors we learned from elsewhere, especially those who have grown up with technology. Initially, cybersecurity starts from home and school, and it is very hard nowadays to exist without some sort of online presence. When it…
For most companies ransomware is the scariest of all cyberattacks
SonicWall released the 2022 SonicWall Threat Mindset Survey which found that 66% of customers are more concerned about cyberattacks in 2022, with the main threat being focused on financially motivated attacks like ransomware. “No one is safe from cyberattacks —…
Are your cybersecurity investments making you less resilient?
In the past decade, digital transformation has become a buzzword in nearly every industry. Organizations have scaled down workforces in favor of automation, moved their servers and networks off-premises, and transferred their data to the cloud, but mostly kept to…
Don’t lose control of your smart thermostat this winter
Winter is coming and the energy crisis is upon us. With rocketing prices and dwindling supply, much of the western world is bracing for three cold months beset by restrictions. Despite the coming hardship, connected devices offer a glimmer of…
ABBYY Proof of Identity simplifies document-centric digital onboarding
ABBYY is solving the billion-dollar identity fraud problem facing consumers and businesses with an all-in-one solution that offers instant identity proofing and affirmation anytime, anywhere. No more standing in line or manually completing cumbersome online forms, ABBYY Proof of Identity…
PKI Spotlight updates help PKI admins catch CRL publishing errors
PKI Solutions announced its latest update of PKI Spotlight. PKI Spotlight is a PKI management solution that provides organizations with real-time monitoring and alerts of availabilities, configurations, and security of all their PKI and Hardware Security Module (HSM) environments. This…
Stytch Strong CAPTCHA protects users from bots and CAPTCHA farms
Stytch announced Strong CAPTCHA, the first product in a suite of security products to reduce online fraud and risk. The product solves the massive problem of CAPTCHA fraud that hurts consumers and damages the brands of online retailers, financial services…
Resistant AI and ComplyAdvantage launch AI-driven solution to combat financial crime
Resistant AI and ComplyAdvantage launched their solution for fighting financial crime across the U.S. and Europe. Financial crime is a multi-trillion-dollar problem. According to the United Nations, the estimated amount of money laundered globally in one year is 2 –…
Stellar Cyber Open XDR now available on Oracle Cloud Marketplace
Stellar Cyber has achieved Powered by Oracle Cloud Expertise for its SaaS security operations platform, which is available on Oracle Cloud Marketplace. The Stellar Cyber Open XDR Platform includes XDR (eXtended Detection and Response) and other valuable capabilities needed for…
Exterro Smart Data Inventory detects all regulations triggered by a processing activity
Exterro introduced Exterro Smart Data Inventory, a new solution designed to help organizations build, monitor and maintain a defensible privacy program based on a single intelligent and dynamic data inventory across record types, assets, 3rd parties and processing activities. In…
Kami Vision unveils Smart Detect AI models to reduce unnecessary alerts
Kami Vision announces the release of Smart Detect now available on nearly all Kami Home security products. The new Smart Detect AI models provide homeowners with greater control over their home security systems to monitor their indoor and outdoor premises…
Endor Labs emerges from stealth with $25 million to protect software supply chains
Endor Labs officially came out of stealth, launching the company with a Dependency Lifecycle Management Platform that helps development and security teams maximize software reuse by safely evaluating, maintaining, and updating dependencies. The average enterprise has more than 40,000 open…
Secureworks launches Taegis XDR and MXDR in Japan to help organizations reduce cyber risk
Secureworks has announced that its extended detection and response (XDR) platform Taegis will be generally available in Japan from November 1, 2022. Secureworks Taegis XDR and Taegis ManagedXDR will enable organizations in Japan to augment their overall cybersecurity posture and…
Cyware hires three industry experts to increase its marketing programs
Cyware has appointed Willy Leichter as Vice President of Marketing, Jeff Bell as Director of Demand Generation, and Mark Bermingham as Director of Product Marketing. In their new roles, Willy, Jeff, and Mark will expand the company’s marketing capabilities. In…
Andrew Rubin joins Armorblox Board of Directors
Armorblox announced the appointment of Andrew Rubin to its board of directors. Rubin, who currently serves as the Chief Executive Officer of Illumio, joins Armorblox in its efforts to protect organizations against email-based, sophisticated and targeted cyberthreats. “Andrew is a…
IDIQ names Michael Scheumack as CMO
IDIQ has named Michael Scheumack to the role of chief marketing officer to be responsible for leading and managing initiatives in both performance and traditional marketing. With more than 20 years of experience in marketing and technology along with more…
Microsoft patches Windows flaw exploited in the wild (CVE-2022-41033)
October 2022 Patch Tuesday is here, with fixes for 85 CVE-numbered vulnerabilities, including CVE-2022-41033, a vulnerability in Windows COM+ Event System Service that has been found being exploited in the wild. But, first and foremost, it should be noted that…
Thoma Bravo acquires ForgeRock for $2.3 billion
ForgeRock announced that it has entered into a definitive agreement to be acquired by Thoma Bravo, a software investment firm, for $23.25 per share, in an all-cash transaction valued at approximately $2.3 billion. The offer represents a premium of approximately…
Auth bypass bug in FortiOS, FortiProxy is exploited in the wild (CVE-2022-40684)
After privately warning customers last week that they need to patch or mitigate CVE-2022-40684, a critical vulnerability affecting FortiOS, FortiProxy, and FortiSwitchManager, Fortinet has finally confirmed that it “is aware of an instance where this vulnerability was exploited.” But their…
2FA is over. Long live 3FA!
In the past few months, we’ve seen an unprecedented number of identity theft attacks targeting accounts protected by two-factor authentication (2FA), challenging the perception that existing 2FA solutions provide adequate protection against identity theft attacks. The recent Uber breach is…
How government organizations can stay steps ahead of attackers
Attacks against governments are nothing new. They have been an interesting target since they have existed, for the mere reason that not everyone agrees on how things are run. In this Help Net Security video, David Masson, Director of Enterprise…
NetSPI’s blockchain penetration testing service helps organizations protect blockchain solutions
NetSPI announced its new deployment-inclusive blockchain penetration testing service. The company will provide a comprehensive, full-spectrum evaluation of blockchain-based deployments to enterprises by utilizing its decades of penetration testing expertise, coupled with its understanding of the architecture’s unique security concerns.…
An introduction to Kali Linux
Kali Linux is a specialized Linux distribution developed by Offensive Security, designed for experienced Linux users who need a customized platform for penetration testing. Kali Linux also comes with several hundred specialized tools for carrying out penetration testing, security research,…
Cybercriminals are having it easy with phishing-as-a-service
In this interview for Help Net Security, Immanuel Chavoya, Threat Detection Expert at SonicWall, talks about phishing-as-a-service (PaaS), the risks it can pose to organization, and what to do to tackle this threat. Phishing-as-a-service has become a growing threat to…
Castle Shield Typhos 3.0 provides users with end-to-end encrypted audio/video capabilities
Castle Shield Holdings announces a major upgrade to its secure messaging app, Typhos. Version 3.0 of Typhos, now includes audio/video calls and audio conference capabilities with end-to-end encryption by default. In addition to secure audio/video communications, Typhos based on the…
EDR is not a silver bullet
Old lore held that shooting a werewolf, vampire, or even just your average nasty villain with a silver bullet was a sure-fire takedown: one hit, no more bad guy. As cybersecurity professionals, we understand – much like folks in the…
RemotePC mobile access allows users to access their remote computers from any iOS or Android device
RemotePC is offering mobile remote access for all users, letting them access their remote desktop from their iOS or Android devices and manage the computer from anywhere. Having the ability to access a computer from a mobile device can be…
Allurity acquires CSIS Security Group to expand its services into new markets
Allurity has acquired the leading Danish service provider CSIS Security Group A/S (“CSIS”), taking yet another leap towards its goal of becoming Europe’s preferred provider of tech-enabled cybersecurity services. Founded in 2003, CSIS has built a solid reputation for innovation,…
ALTR promotes James Beecham to CEO
ALTR announced that company Co-founder and Chief Technology Officer James Beecham has been promoted to Chief Executive Officer. In this role, Beecham will leverage his technical acumen and passion for the industry and the business to lead the company’s next…
Unpatched Zimbra RCE bug exploited by attackers (CVE-2022-41352)
A still unpatched vulnerability (CVE-2022-41352) in Zimbra Collaboration is being exploited by attackers to achieve remote code execution on vulnerable servers. About the vulnerability Zimbra Collaboration (formerly Zimbra Collaboration Suite) is cloud-hosted collaboration software suite that also includes an email…
Critical vm2 sandbox escape flaw uncovered, patch ASAP! (CVE-2022-36067)
Oxeye researchers discovered a severe vm2 vulnerability (CVE-2022-36067) that has received the maximum CVSS score of 10.0. Called SandBreak, this new vulnerability requires R&D leaders, AppSec engineers, and security professionals to ensure they immediately patch the vm2 sandbox if they…
Security and privacy features in macOS Ventura
Apple announced additional security and privacy features for its newest operating system – macOS Ventura. In this Help Net Security video, you’ll learn about new security and privacy features in macOS Ventura. Some of those features are: Passkeys Rapid Security…
Purpose-based access control: Putting data access requests into context
Access control is the heart of data protection. Striking the right balance between easy access and tight security isn’t easy, but getting it right is how you maintain business agility while still meeting regulatory and fiduciary data protection responsibilities. Role-based…
Microsoft Teams: A channel for sensitive business information sharing that needs better backup
Hornetsecurity has found an urgent need for greater backup for Microsoft Teams with 45% of users sending confidential and critical information frequently via the platform. Research commissioned by the company highlights the often-overlooked need for Teams backup and security, as…
Lack of transparency, systemic risks weaken national cybersecurity preparedness
What is critical infrastructure? If you ask 5 different people, you may receive 5 different answers. The term critical infrastructure has lost much of its meaning as a differentiator of private entities and currently defines sectors from energy to commercial…
Increasing network visibility is critical to improving security posture
IT leaders around the world share a ubiquitous appetite for greater network visibility. The findings of a Forrester Consulting study underscore a convergence in security with networking, which IT decision-makers now view as the missing strategy that will improve security…
Board members should make CISOs their strategic partners
Proofpoint released their Cybersecurity: The 2022 Board Perspective report, which explores board of directors’ perceptions about their key challenges and risks. Cybersecurity is dominant on their agendas. Seventy-seven percent of participants agree cybersecurity is a top priority for their board…
Blackpoint Cyber launches product updates to help partners stay ahead of cyberthreats
Blackpoint Cyber has released multiple product launches and updates this fall, as they look ahead to Q4 2022. As the industry trend towards product ecosystems grows, Blackpoint is driven to provide innovative and efficacious solutions. An adapted version of the…
Veracode launches Container Security offering to meet the needs of cloud-native DevOps teams
Veracode has enhanced its Continuous Software Security Platform to include container security. This early access program for Veracode Container Security is now underway for existing customers. The new Veracode Container Security offering, designed to meet the needs of cloud-native software…
Week in review: 7 cybersecurity audiobooks to read, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: MS Exchange zero-days: The calm before the storm? CVE-2022-41040 and CVE-2022-41082, the two exploited MS Exchange zero-days that still have no official fix, have been…
Norauto joins forces with Orange Business Services to upgrade its network infrastructure to SD-WAN
Norauto has joined forces with Orange Business Services to upgrade its network infrastructure to SD-WAN, supporting its digital transformation. The modernization of its network will allow Norauto to offer new customer experiences in its auto centers. Innovations include IP telephony,…
Mirantis Container Runtime now available in the Microsoft Azure Marketplace
Mirantis has unveiled that Mirantis Container Runtime – latest generation of the Docker Enterprise Engine, the secure container runtime that forms the foundation of Mirantis Container Cloud and Mirantis Kubernetes Engine and is used at the heart of many other…
Everi to leverage Prove’s identity solutions for more intuitive and secure gaming experiences
Prove Identity has unveiled that Everi Payments has selected Prove as one of its solution providers for identity verification services. With payment solutions, Everi empowers casino operators to deliver on all aspects of the emerging mobile ecosystem, including funding for…
Strata Identity names Chris Veith as Senior Director of Global Alliances
Chris Veith joins Strata from Okta and, as Senior Director of Global Alliances, will lead the company’s global systems integrator (GSI) partner program. He will manage Strata’s relationships with GSIs, including EY, Deloitte, and Wipro, who serve as trusted partners…
Semtech’s LoRa Connect optimizes CWD Limited’s dual combo module for IoT device connectivity
Semtech has announced that CWD Limited has developed a dual combo module incorporating Semtech’s LoRa Connect platform and the LoRaWAN standard connectivity as well as Bluetooth Low Energy (BLE) to optimize high data rate, long range wireless communication for IoT…
Permutive and PubMatic partner to maintain control and safety over data
As advertisers seek out privacy-centric addressability solutions, Permutive and PubMatic partnership makes publisher data more accessible to advertisers and monetizable for publishers. This new partnership pairs PubMatic’s Connect – which enables media buyers to seamlessly connect with their target audiences…
Kyndryl and Microsoft collaborate to help customers move their mainframe data to the cloud
Kyndryl and Microsoft have announced plans to expand the reach and impact of their global strategic partnership by helping customers expand and increase access to valuable mainframe data. Kyndryl is applying its expertise to create data pipes that enable connections…
SirionLabs appoints Evangelos Apostolou as General Counsel
SirionLabs has appointed Evangelos Apostolou as General Counsel to oversee the company’s legal function as it expands globally. Apostolou was President, EMEA (Europe, Middle East, and Africa) for Sirion from 2016 to 2018 and has been a member of the…
Emotional and physical effects of identity theft are on the rise
The Identity Theft Resource Center (ITRC) has published a research that shows nearly 40 percent of ITRC victims say their personal information was stolen, compromised or misused in the past year. This Help Net Security video provides information how social…
New infosec products of the week: October 7, 2022
Here’s a look at the most interesting products from the past week, featuring releases from HashiCorp, Legit Security, LiveAction, LogRhythm, Pentest People, and Verica. Pentest People SecurePortal 2.0 enables users to identify vulnerabilities as they appear Pentest People re-engineered its…
October 2022 Patch Tuesday forecast: Looking for treats, not more tricks
We’ve entered the final quarter of 2022 with a favorite holiday for many – Halloween, at the end of the month. Unfortunately, Microsoft has continued to play a few tricks on us. Several Microsoft Exchange Server vulnerabilities have been reported…
Tackling the weaknesses of smart buildings’ technology
Like any other innovation, the integration of IoT technology in smart buildings will bring benefits as well as more and newer risks. The market for smart building technologies continues to grow at even faster rates. By 2020, 1.7B connected devices…
3 ways enterprises can mitigate social engineering risks
In this Help Net Security video, Alon Levin, VP of Product Management at Seraphic Security, explains what social engineering is, and how prevalent it is. He offers insight into the three ways enterprises can mitigate the risks of social engineering.…
What $1B in cybersecurity funding can mean for US state, local governments
How do you best spend a cybersecurity budget you have long been hoping you’d get? That’s the question state, local, and territorial (SLT) governments are starting to ask themselves in the wake of a major September announcement from the Department…
Elastic announces new features and enhancements to boost cloud-native observability
Elastic announced new features and enhancements across its Elastic Observability solution, enabling customers to gain deeper and more frictionless visibility at all levels of applications, services, and infrastructure. Elastic’s new Universal Profiling capability, now in private beta, provides visibility into…
Hammerspace announces metadata driven workflow enhancements to simplify access to global data
Hammerspace has introduced another leap forward for the data-driven global workforce with the Hammerspace Metadata Plugin, User Initiated File Protection, and an Automated File Reservation. Hammerspace also announced a new integration with Alchemi Data Elasticsearch. These capabilities enable users to…
Interos launches i-Score to guide corporate boards struggling with global supply chain risks
Interos has released updated scoring technology, the i-Score, to help procurement leaders quickly assess the overall health of their suppliers’ extended supply chains amid escalating recessionary fears, inflation, geopolitical turmoil, ESG violations and other paralyzing supply chain threats. The AI-powered…
HashiCorp HCP Boundary helps organizations struggling with security as they transition to the cloud
HashiCorp released HashiCorp Cloud Platform (HCP) Boundary, a secure remote access product. With this release, Boundary joins HCP Vault and HCP Consul to provide a zero trust security solution to secure applications, networks, and people built for the cloud. As…
Veratad VX improves identity verification and analytics for business users
Veratad announced the unveiling of “Veratad VX” – a new global age and identity verification platform designed to deliver a no-code journey orchestration and automated verification experience. The new VX orchestration platform is an extension of Veratad’s proven core technology,…
Legit Security Legitify detects security and compliance issues across GitHub assets
Legit Security announced Legitify, an open-source security tool to secure GitHub implementations. Legitify is a GitHub misconfiguration scanner that helps security teams and DevOps engineers manage and enforce their GitHub configurations in a secure and scalable way. Legitify is a…
Veracode Container Security secures cloud-native application development
Veracode announced the enhancement of its Continuous Software Security Platform to include container security. This early access program for Veracode Container Security is now underway for existing customers. The new Veracode Container Security offering, designed to meet the needs of…
Shadow APIs hit with 5 billion malicious requests
Cequence Security released its first half 2022 report titled, “API Protection Report: Shadow APIs and API Abuse Explode.” Chief among the findings was approximately 5 billion (31%) malicious transactions targeted unknown, unmanaged and unprotected APIs, commonly referred to as shadow…
Phosphorus enhances its xIoT security platform to strengthen enterprise device security
Phosphorus announced important new enhancements to its Enterprise xIoT Security Platform that will improve organizations’ ability to reduce their xIoT attack surface and prevent sophisticated threats. “The proliferation of xIoT devices is creating vast new risks for today’s enterprises, with…
Notabene SafePII prevents phishing attacks in sensitive compliance systems
On a mission to enable secure and trusted crypto transactions, Notabene launched SafePII, an end-to-end Encrypted Escrow Service for personally identifiable information (PII), created explicitly for Travel Rule compliant transfers. This launch is the latest addition to Notabene’s comprehensive bank-grade…
Elpha Secure raises $20 million to accelerate product development
Elpha Secure Technology has completed a $20 million Series A funding round. Canapi Ventures, a venture capital firm investing in early to growth-stage fintech companies, led the round with participation from Elpha Secure’s existing investors, including Stone Point Ventures, AXIS…
Oort raises $15 million to defend enterprises against identity-based cyberattacks
Oort announced the completion of a $15 million funding round, including both Seed and Series A investments. Oort will use the funds to grow and further accelerate its go-to-market (GTM) strategy. The funding round was co-led by .406 Ventures, a…
SecurityScorecard partners with Wordtext Systems to expand its reach in the APAC region
SecurityScorecard and Wordtext Systems join forces to transform how organizations in the region navigate cyber risk. The partnership gives organizations in the region access to SecurityScorecard’s proprietary ratings system. Using easy-to-understand A-F graded scorecards, the company and its team of…
NordPass joins FIDO Alliance to help change people’s habits when it comes to passwords
NordPass, Nord Security’s password management company, announced that it had joined the FIDO Alliance, a global coalition working to provide open and free authentication standards to help reduce the world’s reliance on passwords. Having already delivered some FIDO-supported passwordless solutions…
Cynet collaborates with TD SYNNEX to provide businesses with automated protection against attacks
Cynet announced it has signed an agreement with TD SYNNEX, a distributor and solutions aggregator for the IT ecosystem. The partnership will significantly expand the distribution of Cynet’s pioneering cybersecurity platform that helps organizations easily deploy automated, comprehensive protection against…
Neeva launches in Europe to provide web users with tracking and ad free search
Search engine Neeva has launched in Europe to rival Google, by giving web users honest search results, no tracking, and with absolutely no advertisements or affiliate links. Neeva puts users first and gives consumers control to customise their web search…
CIS Hardened Images on AWS Marketplace
Does your organization spend countless resources hardening operating systems in the cloud? That’s why CIS pre-hardens virtual machine (VM) images to CIS Benchmark standards. See how these CIS Hardened Images work by trying one in your cloud environment. Free trials…
This year’s biggest cyber threats
OpenText announced the Nastiest Malware of 2022, a ranking of the year’s biggest cyber threats. For the fifth year running, experts combed through the data, analysed different behaviours, and determined which malicious payloads are the nastiest. Emotet regained its place…
BigID Hotspot Reporting enables organizations to visualize their riskiest data
BigID announced Hotspot Reporting, a new feature that gives organizations the power to visualize and remediate their riskiest data. Customers can now easily visualize their data risk in a dashboard designed to surface data hotspots across all dimensions: including sensitivity,…
ManageEngine ADSelfService Plus adds MFA for UAC to secure privileged accounts
ManageEngine, the enterprise IT management division of Zoho Corporation, announced that ADSelfService Plus has released MFA for Windows User Account Control (UAC) prompts that require credentials for added security. This feature is available as part of the product’s Endpoint MFA…
Pradeo acquires Yagaan, strengthens its cybersecurity services unification strategy
Pradeo, a global leader in mobile fleet and application security enters into exclusive negotiations for the acquisition of Yagaan, an application security software company based in France. Thus, the mobile security leader is strengthening his path towards unifying cybersecurity services…
Fine-tuning Germany’s cybersecurity strategy
Recently, Eileen Walther, Northwave’s Country Manager for Germany and specialized in information security, was elected the new Vice President of the Cyber Security Council Germany (Cyber-Sicherheitsrat Deutschland). Before joining Northwave, she was head of the Dutch High Tech Crime Team…
APIs are quickly becoming the most popular attack vector
In this Help Net Security video, Shay Levi, CTO at Noname Security, discusses the findings from a recent API security report, which reveals a growing number of API security incidents, a concerning lack of API visibility, and a level of…
The gap between security and privacy, and what it will take to bridge it
In this Help Net Security video, Bill Tolson, VP of eDiscovery & Compliance at Archive360, talks about the biggest and perhaps only question in information governance right now: Is enterprise data security good enough to ensure data privacy? An Archive360…
Unearth offboarding risks before your employees say goodbye
Saying goodbye is never easy. That’s especially true when it comes to employee offboarding – but not due to sentimentality. In our increasingly digital workplace, offboarding interns, contractors or full-time employees too often ends up with them still having access…