In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies whenever and wherever they need. While this has been a critical boon to productivity and innovation in the…
Tag: Help Net Security
Danish energy sector hit by a wave of coordinated cyberattacks
The Danish energy sector has suffered what is believed to be the most extensive cyberattack in Danish history, according to SektorCERT. Danish energy sector under attack SektorCERT, an organization owned and funded by Danish critical infrastructure (CI) companies, uses a…
DirectDefense ThreatAdvisor 3.0 offers continuous security monitoring and management
DirectDefense launched ThreatAdvisor 3.0, its proprietary security orchestration, automation and response (SOAR) platform. Designed to improve the speed, efficiency, and accuracy of DirectDefense’s Security Operations Center (SOC), ThreatAdvisor 3.0 offers continuous security monitoring and management, automates manual processes, and includes…
Illumio CloudSecure addresses attacks across hybrid and multi-cloud environments
Illumio has expanded its Zero Trust Segmentation Platform with Illumio CloudSecure, enhancing its segmentation portfolio to address attacks across hybrid and multi-cloud environments. Now through a single console, organizations can more quickly reduce the impact of cyberattacks, ransomware, and increase…
KasadaIQ for Fraud enables enterprises to predict and prevent account takeover
Kasada announced KasadaIQ, its new suite of attack prediction services. The first service in this suite — KasadaIQ for Fraud — supplies actionable signals, collected across millions of points across the Internet, for businesses who need insight into how bots…
Lacework unifies code and cloud security
Lacework announced its release of code security, which provides Lacework customers full visibility throughout the complete application development lifecycle. Lacework code security helps prevent security issues from getting into the wild by identifying them before code is deployed, and helps…
SolarWinds expands observability offering to provide enterprises with full visibility into databases
SolarWinds announced major enhancements in its Database Observability capability within the cloud-based SolarWinds Observability platform. SolarWinds Database Observability provides full visibility into open-source, cloud-enabled, and NoSQL databases to identify and address costly and critical threats to their systems and business.…
OneSpan DIGIPASS FX1 BIO protects against social engineering and account takeover attacks
OneSpan introduced its latest innovation to the Digipass Authenticators product line, with DIGIPASS FX1 BIO. This physical passkey with fingerprint scan empowers organizations to embrace passwordless authentication while providing the utmost security against social engineering and account takeover attacks. This…
Juniper networking devices under attack
CISA has ordered US federal agencies to patch five vulnerabilities used by attackers to compromise Juniper networking devices, and to do so by Friday. Most of these bugs are not particularly severe by themselves, but they can be – and…
IBM watsonx.governance manages, monitors, and governs AI models
IBM announced that watsonx.governance will be generally available in early December to help businesses shine a light on AI models and eliminate the mystery around the data going in, and the answers coming out. While generative AI, powered by LLM…