Organizations use outdated approaches to secure APIs
Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites, according to Cloudflare. The report underscores that the volume of.....»»
ZeroFox launches EASM to provide visibility and control over external assets
ZeroFox has unveiled a new External Attack Surface Management (EASM) module on the ZeroFox platform to see and secure external assets. The new capability builds upon ZeroFox’s existing solutions in Digital Risk Protection and Threat Intelligence, o.....»»
Thrive Incident Response & Remediation helps organizations contain and remove threats
Thrive launched Thrive Incident Response & Remediation, an on-demand cybersecurity response service to contain and remove threats, along with engineering assistance to rebuild and restore critical systems. Phishing, ransomware and other cyberattacks.....»»
Netskope and Egress partner to enhance behavioral-based threat detection and response
Egress has announced a partnership with Netskope to enhance behavioral-based threat detection and response, transforming the way organizations manage human risk in cloud email. The partnership enables Egress to aggregate Netskope’s User Confidence.....»»
Greenpeace calls for high seas protected area in Galapagos
Greenpeace on Monday called for the creation of a high seas marine protected zone under a new UN treaty to secure a much wider area around Ecuador's famous Galapagos archipelago......»»
Coalition launches to expand electronic vehicle title and registration process
The eSTART — or Electronic Secure Title and Registration Transformation — Coalition, which will launch Wednesday, wants to bring awareness to legislative efforts, facilitate engagement and dispel misconceptions associated with electronic title an.....»»
Image-based phishing tactics evolve
While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of.....»»
How organizations can keep up with shifting data privacy regulations
With no sign of regulations slowing down, enterprises struggle to keep pace with the rapid changes. According to a recent NTT Data survey of business executives, 3 in 4 organizations can’t keep up with data regulations, holding them back from succe.....»»
Tax-related scams escalate as filing deadline approaches
As the April 15, 2024 tax filing deadline approaches in the US, some old and some new tax-related scams targeting both taxpayers and tax professionals. Tax-related scams targeting taxpayers With taxpayers rushing to file their personal federal income.....»»
Windstream Enterprise and Fortinet join forces to accelerate digital transformation for enterprises
Windstream Enterprise unveiled Secure Flex Premium, a comprehensive suite of advanced technology solutions powered by Fortinet that provides a fully customizable cybersecurity infrastructure aimed to address the current and future network security ne.....»»
How nature-based knowledge can restore local ecosystems and improve community well-being
Organizations in the food and agriculture sector have been looking to nature for inspiration to improve soil health, maintain water quality and foster local food security in the places where they operate......»»
Advanced AI, analytics, and automation are vital to tackle tech stack complexity
97% of technology leaders find traditional AIOps models are unable to tackle the data overload, according to Dynatrace. Organizations are drowning in data The research reveals that organizations are continuing to embrace multi-cloud environments and.....»»
Email security trends in the energy and infrastructure sector
In this Help Net Security video, Mike Britton, CISO at Abnormal Security, discusses how energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. According to Abnormal Security da.....»»
10 free cybersecurity guides you might have missed
This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and organizations. Whether you work for a small business, a large corporation, or.....»»
Insider threats can damage even the most secure organizations
Insider threats encompass both intentional and unintentional actions. Some insiders may maliciously exploit their access for personal gain, espionage, or sabotage, while others may inadvertently compromise security protocols due to negligence, lack o.....»»
Week in review: Attackers use phishing emails to steal NTLM hashes, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What organizations need to know about the Digital Operational Resilience Act (DORA) In this Help Net Security interview, Kris Lovejoy, Global Securi.....»»
Get ready for outdoor adventures with Bluetti’s spring sale on power stations
As spring approaches, people are gearing up for outdoor adventures such as road trips, hiking, and camping. And if that’s the case for you, Bluetti – a company focused on providing energy storage solutions – has what you need to stay powered up.....»»
Cisco patches Secure Client VPN flaw that could reveal authentication tokens (CVE-2024-20337)
Cisco has fixed two high-severity vulnerabilities affecting its Cisco Secure Client enterprise VPN and endpoint security solution, one of which (CVE-2024-20337) could be exploited by unauthenticated, remote attackers to grab users’ valid SAML a.....»»
Why charities focused on the money, not the mission, should listen up
Nonprofit organizations (NPOs) have distinct identities: Some are more motivated by mission, others by money. Now, new research from Rutgers University–New Brunswick finds these preferences can affect an NPO's identity, particularly how receptive i.....»»
Skybox 13.2 empowers organizations to identify and remediate vulnerabilities
Skybox Security announced Skybox 13.2, introducing enhancements to its Vulnerability and Threat Management solution. These updates mark a significant milestone in vulnerability prioritization and attack surface management, empowering organizations wi.....»»
Regula updates Document Reader SDK to reduce the risk of identity theft
Liveness detection, both for individuals and their IDs, has become a cornerstone for a secure customer onboarding process. It is especially crucial in remote scenarios where document submission and verification are done via the Internet. With 65% of.....»»