50 minutes 20 seconds ago
The RSA Conference Early Stage Expo is an innovation space dedicated to promoting emerging talent in the industry. Here are some of the most exciting companies exhibiting innovative products and solutions, which you can see in person in the San Francisco Ballroom, Moscone South, Level 2. Abnormal Security Abnormal Security stops targeted email attacks. Abnormal Behavior Technology models the identity of both employees and external senders, profiles relationships and analyzes email content to stop attacks … More →
The post 10 hot industry newcomers to watch at RSA Conference 2020 appeared first on Help Net Security.
1 hour 20 minutes ago
A sharp increase (57%) in high-risk vulnerabilities drove the threat index score up 8% from December 2019 to January 2020, according to the Imperva Cyber Threat Index. Following the release of Oracle’s Critical Patch Update – which included 19 MySQL vulnerabilities—there was an unusual increase in the vulnerabilities risk component within the Index. Specifically, there was a 57% increase in vulnerabilities that can be accessed remotely with no authentication required, have a public exploit available, … More →
The post High-risk vulnerabilities and public cloud-based attacks on the rise appeared first on Help Net Security.
Help Net Security
1 hour 50 minutes ago
Worldwide spending on information and communications technology (ICT) is forecast to reach $4.3 trillion in 2020, an increase of 3.6% over 2019, according to IDC. Commercial and public sector spending on information technology (hardware, software and IT services), telecommunications services, and business services will account for nearly $2.7 trillion of the total in 2020 with consumer spending making up the remainder. “The slow economy, weak business investment, and uncertain production expectations combined with protectionist policies … More →
The post Worldwide ICT spending forecast to reach $4.3 trillion in 2020 appeared first on Help Net Security.
Help Net Security
2 hours 21 minutes ago
Idaptive, the leading provider of Identity and Access Management solutions, announced a major update to its Next-Gen Access (NGA) platform that adds endpoint security and passwordless capabilities. The update is designed to help organizations with a distributed workforce simplify the onboarding of remote workers and ensure that endpoint devices that do not connect to corporate networks are secured. Previously, the process of providing Windows and Mac devices to remote workers was challenging. The devices had … More →
The post Idaptive adds endpoint security and passwordless capabilities to its Next-Gen Access platform appeared first on Help Net Security.
3 hours 20 minutes ago
White Ops, the global leader in bot mitigation, announced the release of Application Integrity, a new offering designed to protect enterprises from sophisticated bot-based threats including account takeover, automated account creation, and web scraping. Leveraging the industry leadership the company has fostered with its Advertising Integrity and Marketing Integrity products that today verify the humanity of more than 1 trillion interactions per week, Application Integrity enables security teams to best protect their applications from sophisticated … More →
The post White Ops Application Integrity: Protecting enterprises from sophisticated bot attacks appeared first on Help Net Security.
3 hours 50 minutes ago
Trustwave unveiled a new portfolio of consulting and managed security services for Palo Alto Networks Prisma Cloud, the industry’s most comprehensive cloud native security platform (CNSP) designed to govern access, protect data and secure applications. Trustwave support for Prisma Cloud helps enterprises address growing complexities achieving visibility, identifying threats and protecting assets in diverse environments. “Prisma Cloud, in combination with managed security services from partners like Trustwave, gives enterprises powerful options for helping ensure their … More →
The post Trustwave releases consulting and managed security services for Palo Alto Networks Prisma Cloud appeared first on Help Net Security.
4 hours 5 minutes ago
Unisys announced that the company is offering $10,000 to participants who can capture data and credentials protected by the Unisys Stealth cybersecurity solution at RSA Conference 2020 in San Francisco. The “Unisys Stealth Capture the Flag” contest will take place on February 26 at the Moscone Center in San Francisco. The contest will consist of two three-hour sessions, each of which will be limited to one potential winner. Participants must be present, but conference badges … More →
The post Unisys offers $10,000 to those who compromise a target system protected by Stealth appeared first on Help Net Security.
4 hours 20 minutes ago
Hewlett Packard Enterprise (HPE) announced advancements in its data protection offerings with Veeam support for HPE Primera storage and enhancements to HPE StoreOnce backup. HPE and Veeam have partnered to protect customer data for the past decade, and this new support for HPE Primera, together with the just announced Veeam Availability Suite v10, ensures customers’ data is always available, recoverable and protected. In addition, HPE StoreOnce with Veeam v10 delivers higher data availability by efficiently … More →
The post HPE announces Veeam support for HPE Primera storage and enhancements to HPE StoreOnce backup appeared first on Help Net Security.
4 hours 50 minutes ago
Cyware Labs, provider of advanced cyber fusion solutions, announced the release of version 2.0 of the company’s product suite. Available now, enhancements across the matrix of Cyware’s solutions include end-to-end threat intelligence automation, threat response and management capabilities, as well as an improved user interface (UI). To keep up with the increasing volume of sophisticated threats, security teams must be able to move faster and with more accuracy while achieving greater visibility into their environment … More →
The post Cyware’s 2.0 suite of cyber fusion products enables orgs to detect, analyze, and act on security threats appeared first on Help Net Security.
5 hours 21 minutes ago
ElectionShield utilizes BrandShield’s technology to protect political campaigns and candidates from a growing range of online threats. These include social impersonation; fraudulent fundraising schemes; domain squatting; sale of unauthorized merchandise; fake social media content; phishing, social phishing and fake news. The last few years have seen a proliferation of fake social media content, in some cases using ‘deep fake’ video, designed to attack politicians. According to The Guardian, at a US Senate intelligence committee hearing … More →
The post ElectionShield protects political campaigns from online threats appeared first on Help Net Security.
5 hours 35 minutes ago
ClearDATA, the leader in healthcare public cloud security, compliance and privacy, expanded their ClearDATA Comply Software as a Service (SaaS) compliance management product to include Microsoft’s Azure Cloud Services. With this new addition to the ClearDATA portfolio of products, more healthcare providers, payers and life sciences organizations can adopt Azure’s Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) cloud services while mitigating risk of security vulnerabilities with real-time compliance checks and automated … More →
The post ClearDATA Comply SaaS now includes Microsoft’s Azure Cloud Services appeared first on Help Net Security.
5 hours 50 minutes ago
Infoblox, the market leader in next-level networking and DDI services, and Nutanix announced that Infoblox Core DDI and Cloud Platform appliance products, which are part of the Nutanix Elevate Program, have been certified as Nutanix Ready. Infoblox will support its customers with the integration of Nutanix and Infoblox NIOS DNS, DHCP, IPAM (DDI) solutions, including NIOS virtual appliances running on Nutanix AHV and Nutanix Calm support for orchestrated DNS/IPAM workflow. NIOS is now the only … More →
The post Infoblox Core DDI and Cloud Platform appliance products are now certified as Nutanix Ready appeared first on Help Net Security.
6 hours 5 minutes ago
QuintessenceLabs, the leader in quantum-cybersecurity solutions, announced that it secured an investment from In-Q-Tel, the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to the national security communities of the U.S. and its allies. This investment underscores the importance of quantum safe capabilities to support security communities in the US, UK and Australia. Australian-based QuintessenceLabs is a global leader in quantum cybersecurity recognized for its advanced quantum-safe data protection capabilities, including … More →
The post QuintessenceLabs secures investment and expands quantum-safe portfolio appeared first on Help Net Security.
6 hours 5 minutes ago
SentinelOne, the autonomous endpoint protection company, announced it has raised $200 million in Series E funding led by global venture capital and private equity firm Insight Partners, with participation from Tiger Global Management, Qualcomm Ventures LLC, Vista Public Strategies of Vista Equity Partners, Third Point Ventures, and previous investors. The round elevates SentinelOne’s valuation to $1.1 billion. The funding will enable SentinelOne to continue accommodating record breaking customer demand and accelerate growth as the world’s … More →
The post SentinelOne raises $200 million to accommodate customer demand and accelerate growth appeared first on Help Net Security.
6 hours 21 minutes ago
CyberX announced a new API-level integration with Microsoft Azure Security Center for IoT, enabling joint clients to gain a unified view of security across all their managed and unmanaged IoT devices. The combination of CyberX’s agentless security platform and Azure Security Center for IoT provides comprehensive IoT device protection and zero trust security for organizations seeking to reduce risk from enterprise IoT threats as well as from industrial IoT, Smart Buildings, Smart Retail, and more. … More →
The post CyberX integrates with Microsoft Azure Security Center appeared first on Help Net Security.
6 hours 35 minutes ago
Zero Networks unveiled the Zero Networks Access Orchestrator, the first network security platform that automatically defines, enforces and adapts user- and machine-level network access policies to create a continuous airtight zero trust network model, at scale. The company was named one of three finalists for the prestigious RSAC Launch Pad, where it will debut the platform, on February 26th, during the RSA Conference, the world’s leading information security conference. Zero Networks also announced it has … More →
The post Zero Networks Access Orchestrator: Autonomous, airtight network access security at scale appeared first on Help Net Security.
6 hours 50 minutes ago
Veeam Software, the leader in Backup solutions that deliver Cloud Data Management, announced that Gil Vega has been appointed Chief Information Security Officer (CISO). Vega, whose previous experience includes serving as Managing Director and CISO at CME Group and as the Associate Chief Information Officer & CISO for the U.S. Department of Energy and U.S. Immigration & Customs Enforcement in Washington, DC, will be responsible for establishing and maintaining Veeam’s vision and strategy to ensure … More →
The post Gil Vega joins Veeam Software as CISO appeared first on Help Net Security.
14 hours 14 minutes ago
ProcessUnity, a leading provider of cloud-based applications for risk and compliance management, today announced a new pre-built configuration of its award-winning Vendor Risk Management solution. Best Practices Configuration for ProcessUnity Vendor Risk Management (VRM) is a pre-configured Third-Party Risk Management program with turn-key workflows, assessments, calculations, risk analysis and reporting, allowing small to midsize organizations to successfully launch and maintain a third-party risk program from day one. “More and more companies are looking to introduce … More →
The post ProcessUnity Vendor Risk Management expanded to include new best practices configuration appeared first on Help Net Security.
21 hours 30 minutes ago
Since Edward Snowden’s revelations of sweeping internet surveillance by the NSA, the push to encrypt the web has been unrelenting. Bolstered by Google’s various initiatives (e.g., its prioritizing of websites that use encryption in Google Search results, making Chrome mark HTTP sites as “not secure,” and tracking of worldwide HTTPS usage), CloudFlare’s Universal SSL offer and the advent of Let’s Encrypt, nearly seven years later various sources put the percentage of encrypted internet traffic between … More →
The post What is flowing through your enterprise network? appeared first on Help Net Security.
23 hours 20 minutes ago
Zero trust is a concept that is gaining an increasingly large and dedicated following, but it may mean different things to different audiences, so let’s start with a definition. I refer to an excellent post by my friend Lee Newcombe and I agree with his definition of zero trust: “Every request to access a resource starts from a position of zero trust. Access decisions are then made and enforced based on a set of trust … More →
The post Are CISOs ready for zero trust architectures? appeared first on Help Net Security.
Help Net Security