Cloudflare announced Magic WAN Connector, the open source software-defined software package that makes it easier for businesses to connect and secure their network with Cloudflare. With Magic WAN Connector, Cloudflare One is now a true integrated SASE security and networking…
Tag: Help Net Security
Waterfall Security Solutions partners with Yokogawa to improve industrial security
Waterfall Security Solutions announced a collaboration agreement with Yokogawa, a provider of industrial automation and test and measurement solutions. This new collaboration will make Waterfall’s Unidirectional Gateway cybersecurity products and technologies available to Yokogawa’s customers globally. In a world where…
Schneider Electric collaborates with BitSight to enhance OT exposure detection
Schneider Electric partners with BitSight to develop a global Operational Technology (OT) Risk Identification and Threat Intelligence capability. In recent years, both opportunistic and advanced cyber threat actors have shown increased willingness to target industrial and operational sites. Schneider Electric…
42Crunch integrates with Microsoft to provide enterprises with end-to-end API protection
42Crunch has joined the Microsoft Intelligent Security Association (MISA), a group of security technology providers who have integrated their solutions with Microsoft’s security technology products to better defend against a world of increasing threats. 42Crunch has integrated with Microsoft Sentinel…
NetSPI acquires nVisium to scale its offensive security solutions
NetSPI has acquired nVisium to further scale its offensive security solutions and address heightened demand for human-delivered penetration testing. nVisium will support NetSPI’s continued efforts to deliver strategic security testing solutions to enterprises. With the acquisition, NetSPI now has over…
Simeio acquires PMG to protect digital identities
Simeio’s acquisition of PathMaker Group (PMG) is a key strategic move that complements Simeio’s organic strategy of expanding into new industries and talent pools and adding new capabilities around identity orchestration and automation. The acquisition also strengthens Simeio’s presence in…
Microsoft plugs actively exploited zero-day hole (CVE-2023-21674)
To mark the January 2023 Patch Tuesday, Microsoft has released patches for 98 CVE-numbered vulnerabilities, including one exploited in the wild (CVE-2023-21674) and one (CVE-2023-21549) that’s been publicly disclosed. Both allow attackers to elevate privileges on the vulnerable machine. Vulnerabilities…
You must build a security team. Where do you start?
Security veteran Chris Deibler, the new VP of Security at DataGrail, has been brought in to build the company’s security team to support its growth. A former Director of Security Engineering at Shopify and Director of Security at Twitch, he…
How to gain security consciousness through cost
In this Help Net Security video, Karthik Kannan, CEO at Anvilogic, talks about predictions for the cybersecurity world in 2023 and how to gain security consciousness through cost. The post How to gain security consciousness through cost appeared first on…
4 identity security trends to watch in 2023
While many of the tried and true best security hygiene practices remain, we’ll face new and complex business challenges related to how we work, the systems we use, threats and compliance issues we face. Although often overlooked, a strong identity…
Guide: How virtual CISOs can efficiently extend their services into compliance readiness
Compliance services are emerging as one of the hottest areas of cybersecurity. While compliance used to be mainly the province of large enterprises, times have changed, and it is now a day-to-day concern for a growing number of small and…
Cloudflare Digital Experience Monitoring measures and analyzes mission critical apps and services
Cloudflare has released Cloudflare Digital Experience Monitoring, an all in one dashboard that helps CIOs understand how critical applications and Internet services are performing across their entire corporate network. Cloudflare Digital Experience Monitoring, part of Cloudflare’s Zero Trust platform, will…
Zyxel releases XMG1930 series of switches for SMBs
Zyxel Networks has launched the XMG1930 series switches that provide SMBs, system integrators, managed service providers, and small internet service providers with a solution to support the increasing bandwidth requirements driven by advanced business applications. Upgrade network speeds without re-cabling…
DataGrail names Chris Deibler as VP of Security
DataGrail announced that Chris Deibler, formerly of Shopify, Twitch, and Box, has been named DataGrail’s VP of Security. Deibler will oversee the building out of the security team for DataGrail as it transitions into its next phase of growth. The…
Appgate appoints Leo Taddeo as CEO and President
Appgate has unveiled that its board of directors has appointed Leo Taddeo as the company’s new Chief Executive Officer and President, effective January 4, 2023. With 25 years of executive federal and commercial experience, Taddeo had been serving as Appgate’s…
Rackspace ransomware attack was executed by using previously unknown security exploit
The MS Exchange exploit chain recently revealed by Crowdstrike researchers is how the Play ransomware gang breached the Rackspace Hosted Exchange email environment, the company confirmed last week. The exploit chains CVE-2022-41082, a RCE flaw, and CVE-2022-41080, a privilege escalation…
Codenotary extends immudb to store SOC and SIEM data with cryptographic verification
immudb has a connector to store events and data gathered by Security Operations Center (SOC) and Security Information and Event Management (SIEM) tools from Splunk, Elastic, plus IBM QRadar XDR and Microsoft Sentinel. “It’s important to store logs and events…
It’s official: Digital trust really matters to everyone online
The new trust Business has always relied upon a foundation of trust. Before we did business we looked our potential business partner in the eye, shook their hand and got a sense of their trustworthiness. But trust today is based…
How to improve your incident response plan for 2023
You may already have an IR plan but regardless of how thorough you might feel it is at this moment, the evolving cyber threat landscape and shifting circumstances within your organization demand regular changes and improvements. What are the attack…
Why FIDO and passwordless authentication is the future
In this Help Net Security video, Jason Kent, Director at Open Seas, explains why FIDO and passwordless authentication is the future. He dives deep into the technical reasons and explains why physical FIDO authentication is safer than other software/app/SMS solutions.…
Trend Micro establishes new subsidiary for 5G cybersecurity
Trend Micro has established CTOne, a new Trend Micro subsidiary focused on advancing 5G network security and beyond. The group’s intellectual capital and leadership come from Trend Micro’s culture of innovation and is the latest incubation project to launch as…
January 2023 Patch Tuesday forecast: Procrastinate at your own risk
The start of a new year means it’s time to start working towards achieving your annual resolutions. Based on the headlines from the December news media, perhaps the most important point is don’t procrastinate! We should all have some sort…
Cloud-native application adoption puts pressure on appsec teams
Oxeye revealed five predictions expected to shape enterprise security spending in 2023. The predictions follow industry-wide research, which shows the industry is shifting away from legacy software infrastructure and standardizing on cloud-native applications – resulting in the need for new…
Digital forensics incident readiness
Digital forensics is used to find, examine and analyze digital evidence that can serve in criminal investigations, but also in incident response, investigations of data breaches, to unearth insider threats, etc. Colm Gallagher, Forensics Director, CommSec Communications & Security, talks…
What to consider when budgeting for 2023’s OT cybersecurity needs and wants
Regardless of what 2023 holds in store for the economy, your organization’s financial commitment to supporting OT cybersecurity efforts is being decided now. In the public sector, much of the funding needed to secure critical infrastructure has already been allocated.…
Box for Salesforce updates help businesses secure work from anywhere
Box has released new enhancements to the Box for Salesforce integration on Salesforce AppExchange, that helps businesses connect teams to their content so they can work securely from anywhere. “With hundreds of apps used in the average enterprise, we know…
LogRhythm platform enhancements enable analysts to detect threats
LogRhythm has unveiled a series of expanded capabilities and integrations for its security operations solutions. The updates propel LogRhythm’s ability to be a force multiplier for overwhelmed security teams who are expected to confidently, effectively, and efficiently defend against cyberattacks.…
Valeo and C2A Security partner to improve security for customers and modern vehicles
Valeo and C2A Security have unveiled a strategic collaboration to enhance Valeo’s cybersecurity offerings on their products in development and continuous operations. The new partnership addresses the industry’s need for streamlined and efficient cybersecurity. As cars become more software-centric and…
GuardKnox and Wind River join forces to bring new vehicle features to market
GuardKnox is collaborating with Wind River to enable developers to build secure containerized applications for software-defined vehicles of the future. The combination of GuardKnox’s SOA (Service Oriented Architecture) core framework and corresponding tools suite with Wind River’s VxWorks real-time operating…
Keysight collaborates with Qualcomm to accelerate 5G non-terrestrial network communication
Keysight Technologies has collaborated with Qualcomm Technologies to establish an end-to-end 5G non-terrestrial network (NTN) connection. Based on this successful demonstration of call signaling and data transfer using orbit trajectory emulation, Keysight and Qualcomm Technologies aim to accelerate 5G NTN…
Things to know and do before you switch from VPN to ZTNA
Will your organization fall apart if you don’t switch from a VPN to a zero trust network access (ZTNA) solution in the near future? I’m here to tell you it won’t. The reality of VPN vs. ZTNA For a while…
Data backup is no longer just about operational fallback
Data backup has traditionally been in the operational domain of IT, while security teams have been responsible for threats to data from attacks. As these attacks have become more sophisticated, backups have come under threat and vendors have had to…
The DevSecOps approach to cloud native threat detection and response
Every SOC on the planet is grappling with the challenges of integrating detection techniques and response processes for public cloud computing. This presentation by Rich Mogull, SVP Cloud Security at FireMon, delves into the details with a framework for modernizing…
HARMAN DefenSight Cybersecurity Platform helps enterprises protect IT systems
HARMAN has unveiled that its Digital Transformation Solutions (DTS) business unit is introducing DefenSight Cybersecurity Platform to help enterprises keep their IT systems safe and secure using real-time threat intelligence analytics. DefenSight Cybersecurity Platform identifies vulnerable systems through continuous monitoring…
CORL Technologies unveils third-party risk management service for healthcare
CORL Technologies introduced Third-Party Incident Response (TPIR), allowing healthcare providers to address third-party security incidents proactively. CORL’s TPIR service tames the chaos of incident response by enabling healthcare companies to share information and provide total clarity about how each party…
IronNet’s latest NDR updates provide broader visibility of cyber threats
IronNet enhances its network detection and response (NDR) solution, IronDefense, enabling early visibility of unknown cyber threats that have slipped past endpoint and firewall detection and entered the network, whether on-premises or in the cloud. With IronNet’s latest NDR updates,…
Attackers evolve strategies to outmaneuver security teams
Attackers are expected to broaden their targeting strategy beyond regulated verticals such as financial services and healthcare. Large corporations (41%) will be the top targeted sector for cyberattacks in 2023, favored over financial institutions (36%), government (14%), healthcare (9%), and…
How can businesses decrease cyber insurance premiums while maintaining coverage?
In 2022, significant geopolitical developments have led to equally significant changes within the cyber insurance market. In this Help Net Security video, Chris Denbigh-White, Global Director of Customer Success for Next DLP, discusses how, with the increasing number of breaches,…
How to start planning for disaster recovery
There is a famous quote I often think about at 3am on a Sunday morning as I am working with a client to recover from a large-scale cybersecurity incident: “Fail to prepare, prepare to fail.” It is painfully obvious which…
MediaTek introduces Genio 700 for industrial and smart home products
MediaTek announced the latest chipset in the Genio platform for IoT devices, the octa-core Genio 700 designed for smart home, smart retail, and industrial IoT products. With a focus on power efficiency, the MediaTek Genio 700 is a N6 (6nm)…
Security teams expect breach and incident reporting requirements to create more work
Most IT security professionals will focus on improving “detect” and “respond” capabilities, amidst concern over increasing costs and regulatory pressures, according to Deepwatch. The report found that digital transformation initiatives and regulatory requirements were the top two cost drivers expected…
Tracking the adversary
Raj Samani, SVP, Chief Scientist, Rapid7, discusses the tactics observed from a recent case of espionage, and what can be learned from such observations. This video was recorded at IRISSCON 2022, an annual conference organized by IRISSCERT. The all-day event…
The cybersecurity industry will undergo significant changes in 2023
The cybersecurity industry will undergo some significant changes in 2023. As more systems get connected, we can expect to see more outages. We probably won’t see a “digital Pearl Harbor,” but we will see more breaches, impact, and fear. How…
Kali Linux: What’s next for the popular pentesting distro?
If you’re interested in penetration testing and digital forensics, you know that Kali Linux is worth a try. And if you’re already doing it, chances are good you are already using it. We talked to Jim O’Gorman, Chief Content and…
Attackers never let a critical vulnerability go to waste
GreyNoise Intelligence unveiled its research report that dives deep into the most significant threat detection events of the past 12 months. “When it comes to cybersecurity, not all vulnerabilities are created equal, and many of the ones that garner media…
Ransomware: The security debt collector
High-profile ransomware news stories grabbed headlines a few years ago but faded in popularity as other attacks like cryptojacking grew more profitable. Since the first months of 2020, ransomware attacks have been on the rise and are in the news…
Getting data loss prevention right
When a CISO takes the wrong approach to data loss prevention (DLP), it can quickly compound into a triple loss. First, they lose their organization’s money by investing in an ineffective solution that meets required regulations but does little else.…