Unified Communications Minimize Cyber Security Threats
We are living in a digital world. Our day-to-day life whether it is personal, or official is all or most of it is digital. Digital has become an integral part of our lives and is hard to image a life without digital. While digital technology is drivi.....»»
Europe’s ambitious satellite Internet project appears to be running into trouble
The devil, as always, is in the details. Enlarge / EU Commissioner for Internal Market Thierry Breton wants Europe to have its own secure satellite communications network. (credit: Thierry Monasse/Getty Images) It has be.....»»
Infosec products of the month: April 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, Invicti Security, LogRhythm, Netwrix, Owl Cyber Defense Solutions, Privace.....»»
Building a strong cloud security posture
In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many leaders are unaware that they need to secure the cloud the same way they wo.....»»
Cybersecurity jobs available right now: May 1, 2024
Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for testing and evaluating the security of a LyondellBasell’s networks, systems, and applic.....»»
Making cybersecurity more appealing to women, closing the skills gap
In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis emphasizes the need for proactive strategies to attract diverse talent, imp.....»»
The academic sleuth facing death threats and ingratitude
Lonni Besançon devotes evenings and weekends to rarely appreciated sanitation work. By examining scientific articles after they are published and exposing shortcomings, he has made himself an enemy of both researchers and publishers. It has gone so.....»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»
FCC fines major wireless carriers over illegal location data sharing
The Federal Communications Commission (FCC) fined the nation’s largest wireless carriers for illegally sharing access to customers’ location information without consent and without taking reasonable measures to protect that information against un.....»»
Synopsys Polaris Assist automates repetitive, time-consuming tasks for security and development teams
Synopsys introduced Polaris Assist, an AI-powered application security assistant on the Synopsys Polaris Software Integrity Platform. Polaris Assist combines Large Language Model (LLM) technology with decades of Synopsys’ application security knowl.....»»
Onyxia launches AI-powered predictive insights to optimize security management
Onyxia Cyber unveiled OnyxAI to deliver insights that enable security leaders to proactively optimize security performance, resource allocation, and risk management. “We are seeing a real need in the market for security solutions that can simplify.....»»
Adaptive Shield unveils SaaS security for AI
Adaptive Shield announced SaaS Security Posture Management (SSPM) detection and response capabilities for AI-driven applications to enable enterprises to mitigate the risks introduced by the growing use of generative AI. The workforce is rapidly adop.....»»
Security analysts believe more than half of tasks could be automated
Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI expected to boost threat detection In fact, security analysts maintain that up t.....»»
Why the automotive sector is a target for email-based cyber attacks
While every organization across every vertical is at risk of advanced email attacks, certain industries periodically become the go-to target for threat actors. In this Help Net Security video, Mick Leach, Field CISO at Abnormal Security, discusses wh.....»»
Tracecat: Open-source SOAR
Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially understaffed small- to mid-sized teams. Core features, user interfaces, and day-to-day workflow.....»»
Triangulation fraud: The costly scam hitting online retailers
In this Help Net Security interview, Mike Lemberger, Visa’s SVP, Chief Risk Officer, North America, discusses the severe financial losses resulting from triangulation fraud, estimating monthly losses to range from $660 million to $1 billion among m.....»»
CyberQP unveils solutions to help MSPs proactively prevent security incidents
CyberQP announced QGuard Pro, a solution with enhanced capabilities designed to exponentially increase technician efficiency, and a new API for Deployment are now generally available. QGuard Pro comes with Passwordless MFA for Technicians, which augm.....»»
ThreatX provides always-active API security from development to runtime
ThreatX has extended its Runtime API and Application Protection (RAAP) offering to provide always-active API security from development to runtime, spanning vulnerability detection at Dev phase to protection at SecOps phase of the software lifecycle......»»
FCC fines big three carriers $196M for selling users’ real-time location data
FCC finalizes $196M penalties for location-data sales revealed in 2018. Enlarge (credit: Getty Images | SOPA Images ) The Federal Communications Commission today said it fined T-Mobile, AT&T, and Verizon $196 million "fo.....»»
Critics question tech-heavy lineup of new Homeland Security AI safety board
CEO-heavy board to tackle elusive AI safety concept and apply it to US infrastructure. Enlarge (credit: Benj Edwards | Getty Images) On Friday, the US Department of Homeland Security announced the formation of an Artific.....»»
Better reservoir management could aid food security and fisheries conservation in US
After nearly a century of people building dams on most of the world's major rivers, artificial reservoirs now represent an immense freshwater footprint across the landscape. Yet, these reservoirs are understudied and overlooked for their fisheries pr.....»»