Tag: Help Net Security

NetSPI acquires nVisium to scale its offensive security solutions

NetSPI has acquired nVisium to further scale its offensive security solutions and address heightened demand for human-delivered penetration testing. nVisium will support NetSPI’s continued efforts to deliver strategic security testing solutions to enterprises. With the acquisition, NetSPI now has over…

Simeio acquires PMG to protect digital identities

Simeio’s acquisition of PathMaker Group (PMG) is a key strategic move that complements Simeio’s organic strategy of expanding into new industries and talent pools and adding new capabilities around identity orchestration and automation. The acquisition also strengthens Simeio’s presence in…

Microsoft plugs actively exploited zero-day hole (CVE-2023-21674)

To mark the January 2023 Patch Tuesday, Microsoft has released patches for 98 CVE-numbered vulnerabilities, including one exploited in the wild (CVE-2023-21674) and one (CVE-2023-21549) that’s been publicly disclosed. Both allow attackers to elevate privileges on the vulnerable machine. Vulnerabilities…

You must build a security team. Where do you start?

Security veteran Chris Deibler, the new VP of Security at DataGrail, has been brought in to build the company’s security team to support its growth. A former Director of Security Engineering at Shopify and Director of Security at Twitch, he…

How to gain security consciousness through cost

In this Help Net Security video, Karthik Kannan, CEO at Anvilogic, talks about predictions for the cybersecurity world in 2023 and how to gain security consciousness through cost. The post How to gain security consciousness through cost appeared first on…

4 identity security trends to watch in 2023

While many of the tried and true best security hygiene practices remain, we’ll face new and complex business challenges related to how we work, the systems we use, threats and compliance issues we face. Although often overlooked, a strong identity…

Zyxel releases XMG1930 series of switches for SMBs

Zyxel Networks has launched the XMG1930 series switches that provide SMBs, system integrators, managed service providers, and small internet service providers with a solution to support the increasing bandwidth requirements driven by advanced business applications. Upgrade network speeds without re-cabling…

DataGrail names Chris Deibler as VP of Security

DataGrail announced that Chris Deibler, formerly of Shopify, Twitch, and Box, has been named DataGrail’s VP of Security. Deibler will oversee the building out of the security team for DataGrail as it transitions into its next phase of growth. The…

Appgate appoints Leo Taddeo as CEO and President

Appgate has unveiled that its board of directors has appointed Leo Taddeo as the company’s new Chief Executive Officer and President, effective January 4, 2023. With 25 years of executive federal and commercial experience, Taddeo had been serving as Appgate’s…

How to improve your incident response plan for 2023

You may already have an IR plan but regardless of how thorough you might feel it is at this moment, the evolving cyber threat landscape and shifting circumstances within your organization demand regular changes and improvements. What are the attack…

Why FIDO and passwordless authentication is the future

In this Help Net Security video, Jason Kent, Director at Open Seas, explains why FIDO and passwordless authentication is the future. He dives deep into the technical reasons and explains why physical FIDO authentication is safer than other software/app/SMS solutions.…

Trend Micro establishes new subsidiary for 5G cybersecurity

Trend Micro has established CTOne, a new Trend Micro subsidiary focused on advancing 5G network security and beyond. The group’s intellectual capital and leadership come from Trend Micro’s culture of innovation and is the latest incubation project to launch as…

Cloud-native application adoption puts pressure on appsec teams

Oxeye revealed five predictions expected to shape enterprise security spending in 2023. The predictions follow industry-wide research, which shows the industry is shifting away from legacy software infrastructure and standardizing on cloud-native applications – resulting in the need for new…

Digital forensics incident readiness

Digital forensics is used to find, examine and analyze digital evidence that can serve in criminal investigations, but also in incident response, investigations of data breaches, to unearth insider threats, etc. Colm Gallagher, Forensics Director, CommSec Communications & Security, talks…

LogRhythm platform enhancements enable analysts to detect threats

LogRhythm has unveiled a series of expanded capabilities and integrations for its security operations solutions. The updates propel LogRhythm’s ability to be a force multiplier for overwhelmed security teams who are expected to confidently, effectively, and efficiently defend against cyberattacks.…

Attackers evolve strategies to outmaneuver security teams

Attackers are expected to broaden their targeting strategy beyond regulated verticals such as financial services and healthcare. Large corporations (41%) will be the top targeted sector for cyberattacks in 2023, favored over financial institutions (36%), government (14%), healthcare (9%), and…

How to start planning for disaster recovery

There is a famous quote I often think about at 3am on a Sunday morning as I am working with a client to recover from a large-scale cybersecurity incident: “Fail to prepare, prepare to fail.” It is painfully obvious which…

Tracking the adversary

Raj Samani, SVP, Chief Scientist, Rapid7, discusses the tactics observed from a recent case of espionage, and what can be learned from such observations. This video was recorded at IRISSCON 2022, an annual conference organized by IRISSCERT. The all-day event…

Attackers never let a critical vulnerability go to waste

GreyNoise Intelligence unveiled its research report that dives deep into the most significant threat detection events of the past 12 months. “When it comes to cybersecurity, not all vulnerabilities are created equal, and many of the ones that garner media…

Ransomware: The security debt collector

High-profile ransomware news stories grabbed headlines a few years ago but faded in popularity as other attacks like cryptojacking grew more profitable. Since the first months of 2020, ransomware attacks have been on the rise and are in the news…

Getting data loss prevention right

When a CISO takes the wrong approach to data loss prevention (DLP), it can quickly compound into a triple loss. First, they lose their organization’s money by investing in an ineffective solution that meets required regulations but does little else.…