Secondhand routers may be a serious security concern
Security researchers revealed that enterprise routers purchased on eBay were chock-full of company data and could be a security risk for many institutions......»»
How human-led threat hunting complements automation in detecting cyber threats
In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and strategies in threat hunting and explains how human-led approaches complement each other to form a ro.....»»
Chemical chameleon reveals novel pathway for separating rare-earth metals
Researchers at the Department of Energy's Oak Ridge National Laboratory have found a chemical "chameleon" that could improve the process used to purify rare-earth metals used in clean energy, medical and national security applications......»»
End of an era: Security budget growth slows down
Amidst global economic and geopolitical uncertainty, markets are jittery, companies are spending frugally, and investors remain cautious, according to IANS Research and Artico Search. Security budgets are also affected by these realities with most bu.....»»
Phishing in focus: Disinformation, election and identity fraud
The frequency of phishing attacks is rising as attackers increasingly utilize AI to execute more scams than ever before. In this Help Net Security video, Abhilash Garimella, Head Of Research at Bolster, discusses how phishing scams are now being host.....»»
Best practices for implementing the Principle of Least Privilege
In this Help Net Security interview, Umaimah Khan, CEO of Opal Security, shares her insights on implementing the Principle of Least Privilege (PoLP). She discusses best practices for effective integration, benefits for operational efficiency and audi.....»»
Security Bite: Apple makes changes to its security releases page, including fun easter egg
9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art App.....»»
Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability allows Yubico security keys to be cloned Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware se.....»»
Rippling IT helps IT teams boost security and banish busywork
If you’re an IT admin, you’ve got a lot on your plate. Managing the entire user lifecycle can feel like a complex laundry list of manual tasks: switching between systems, provisioning access, configuring and retrieving laptops, resetting password.....»»
Challenging internal displacement policy within the broader security environment
The time frame defining "protracted displacement" by the United Nations may need to be significantly shortened, according to a new study on internally displaced persons (IDPs) which suggests earlier support is needed for affected communities......»»
Homeland Security looks to infosec testbed to help protect ports
The department revealed ambitions to help ports develop better cyber security......»»
Reolink shines at IFA 2024 with major rebranding and groundbreaking new products
Reolink is one of the hottest brands in the smart home security market, and things are about to get even hotter. The company has a … The post Reolink shines at IFA 2024 with major rebranding and groundbreaking new products appeared first on BGR.....»»
Veza and HashiCorp join forces to help prevent credential exposure
Veza announced a partnership with HashiCorp to deliver an integrated solution for solving modern identity security challenges. Together, the Veza Access Platform and HashiCorp Vault empower joint customers to strengthen their identity security postur.....»»
Cequence Security partners with Netskope to provide protection for business-critical APIs
Cequence Security announced a new partnership with Netskope. Through the partnership, Netskope customers can now leverage unique API threat intelligence from the Cequence Unified API Protection (UAP) platform to unlock insights into real-world threat.....»»
New infosec products of the week: September 6, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Binarly, Bitdefender, Prompt Security, Revenera, Skyhigh Security, and Vanta. Bitdefender Security for Creators protects YouTube content creators and influen.....»»
Human firewalls are essential to keeping SaaS environments safe
Businesses run on SaaS solutions: nearly every business function relies on multiple cloud-based tech platforms and collaborative work tools like Slack, Google Workspace apps, Jira, Zendesk and others. We recently surveyed security leaders and CISOs o.....»»
Groundwater use can be accurately monitored with satellites using remote sensing platform, new study finds
Drought is a widespread concern in the Western U.S., and water managers across the region are developing groundwater management plans to conserve the essential resource. Groundwater is often pumped to the surface to irrigate crops, and meters that me.....»»
ExpressVPN Deals: Save 48% when you sign up today
If you're looking for a VPN to help provide you some extra security and get around geo-locked content, then this deal from ExpressVPN will serve you quite well!.....»»
Vanta empowers GRC teams to make their security and compliance automated
Vanta announced new product features and milestones, allowing customers to automate existing GRC workflows and gain continuous visibility across their security and compliance program. Vanta’s new Report Center, enhancements to VRM and milestone ach.....»»
Your Galaxy S24 is about to big software update. Here’s what’s new
Samsung Galaxy S24 device owners are in for a treat. A new version of One UI is being rolled out that offers improved AI features and security updates......»»
Binarly Transparency Platform 2.5 identifies critical vulnerabilities before they can be exploited
Binarly announced Binarly Transparency Platform 2.5 with several features designed to enhance software vulnerability management and improve security posture across enterprise environments. The key highlight of this release is the innovative Reachabil.....»»