Advertisements


Organizations are placing OT cybersecurity responsibility on CISOs

Protecting operational technology (OT) systems is now more critical than ever as more organizations connect their OT environments to the internet, according to Fortinet. Although IT/OT convergence has many benefits, it is being hampered and handicapp.....»»

Category: securitySource:  netsecurityMay 31st, 2023

Trend Micro expands AI-powered cybersecurity platform

Trend Micro launched significant additional AI-powered functionality in its platform to secure organizational use of AI and better manage the risks associated with mass adoption of new AI tools. “Great advancements in technology always come wit.....»»

Category: securitySource:  netsecurityRelated NewsMay 2nd, 2024

Veracode platform enhancements help organizations reduce application risk

Veracode announced platform innovations that set a new standard for developer-powered application security. New repo risk visibility and analysis from Longbow Security, powered by Veracode, speeds up remediation of application risk from code reposito.....»»

Category: securitySource:  netsecurityRelated NewsMay 2nd, 2024

Venafi launches 90-Day TLS Readiness Solution

Venafi launched its new 90-Day TLS Readiness Solution to help organizations comply with Google’s proposed 90-day TLS certificate standard, improving security posture while reducing the risk of certificate-related interruptions. According to a V.....»»

Category: securitySource:  netsecurityRelated NewsMay 2nd, 2024

Deep Instinct DIANNA provides malware analysis for unknown threats

Deep Instinct announced the launch of Deep Instinct’s Artificial Neural Network Assistant (DIANNA), an AI-based cybersecurity companion that provides explainability into unknown threats. DIANNA enhances Deep Instinct’s prevention-first approa.....»»

Category: securitySource:  netsecurityRelated NewsMay 2nd, 2024

Skyhawk Security unveils cloud-native CTEM, streamlining security with AI-powered automation

Skyhawk Security has unveiled its cloud native Continuous Threat Exposure Management (CTEM) solution. The agentless approach empowers organizations to automate their CTEM program for the first time and operationalize it through Skyhawk’s existing A.....»»

Category: securitySource:  netsecurityRelated NewsMay 2nd, 2024

Women rising in cybersecurity roles, but roadblocks remain

The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several significant findings. These include promising trends in women’s entry into the profession, their roles wit.....»»

Category: securitySource:  netsecurityRelated NewsMay 2nd, 2024

Essential steps for zero-trust strategy implementation

63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, this investment represents less than 25% of the overall cybersecurity budget......»»

Category: securitySource:  netsecurityRelated NewsMay 1st, 2024

Cybersecurity jobs available right now: May 1, 2024

Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for testing and evaluating the security of a LyondellBasell’s networks, systems, and applic.....»»

Category: securitySource:  netsecurityRelated NewsMay 1st, 2024

Making cybersecurity more appealing to women, closing the skills gap

In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis emphasizes the need for proactive strategies to attract diverse talent, imp.....»»

Category: securitySource:  netsecurityRelated NewsMay 1st, 2024

Cybersixgill Third-Party Intelligence module identifies potential supply chain risks

Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»

Category: securitySource:  netsecurityRelated NewsApr 30th, 2024

eBook: Do you have what it takes to lead in cybersecurity?

Organizations worldwide need talented, experienced, and knowledgeable cybersecurity teams who understand the advantages and risks of emerging technologies. Aspiring leaders in the cybersecurity field need more than just job experience. They need a di.....»»

Category: securitySource:  netsecurityRelated NewsApr 30th, 2024

Weak passwords for smart home devices to be illegal in Europe

Default passwords for smart home devices and wireless routers will have to be made stronger in order to comply with new cybersecurity laws in both the UK and EU … more….....»»

Category: topSource:  informationweekRelated NewsApr 29th, 2024

Silobreaker empowers users with timely insight into key cybersecurity incident filings

Silobreaker announced the addition of automatic collection, AI-enhanced analysis, and alerting on 8-K cybersecurity incident filings made to the US Securities and Exchange Commission (SEC). This enhancement to the Silobreaker platform empowers organi.....»»

Category: securitySource:  netsecurityRelated NewsApr 29th, 2024

UK enacts IoT cybersecurity law

The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure poli.....»»

Category: securitySource:  netsecurityRelated NewsApr 29th, 2024

Anticipating and addressing cybersecurity challenges

In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about how increased adoption of cloud technology, remote work, and the proliferation of IoT devices present significant challenges.....»»

Category: securitySource:  netsecurityRelated NewsApr 29th, 2024

Closing the cybersecurity skills gap with upskilling programs

The list of skills technologists and organizations need to succeed grows with each new tech advancement, according to Pluralsight. But for many organizations, budgets and staff continue to shrink. This survey asked 1,400 executives and IT professiona.....»»

Category: securitySource:  netsecurityRelated NewsApr 29th, 2024

What AI can tell organizations about their M&A risk

Following the past few years of economic turbulence, merger and acquisition (M&A) activity is on the rise in 2024, with several acquisition deals being announced in the first few months of the year valued at billions of dollars. With the surge of AI.....»»

Category: securitySource:  netsecurityRelated NewsApr 26th, 2024

Breaking down the numbers: Cybersecurity funding activity recap

Here’s a list of interesting cybersecurity companies that received funding so far in 2024. Aim Security January | $10 million Aim Security raised $10 million in seed funding, led by YL Ventures, with participation from CCL (Cyber Club Lond.....»»

Category: securitySource:  netsecurityRelated NewsApr 26th, 2024

Former Apple researchers launch startup focused on protecting iOS devices

Two former Apple employees who worked for the company as cybersecurity researchers are now launching their own startup. Called DoubleYou, the startup is focused on helping creators of cybersecurity products protect iOS devices and Macs. more….....»»

Category: topSource:  pcmagRelated NewsApr 26th, 2024

Sublime Security secures $20 million to strengthen cloud email security and visibility

Sublime Security has raised $20 million in Series A funding, led by Index Ventures with participation from previous investors Decibel Partners and Slow Ventures. Cybersecurity visionary and Crowdstrike Co-founder & former CTO Dmitri Alperovitch is al.....»»

Category: securitySource:  netsecurityRelated NewsApr 25th, 2024