Cohesity announced the appointment of Kevin Delane as chief revenue officer. He brings more than 30 years of relevant experience working for high-growth technology companies. Delane has a strong track record in business development, go-to-market, sales operations, international sales, strategic alliances, and partner management. Delane will leverage his vast experience in these areas to oversee the sales and partner functions worldwide at Cohesity. Prior to joining Cohesity, Delane was vice president of worldwide sales at … More →
Akamai Technologies announced it has entered into a definitive agreement to acquire Tel Aviv, Israel-based Guardicore. By adding Guardicore’s micro-segmentation solution into Akamai’s extensive zero trust security portfolio, Akamai will be uniquely suited to provide comprehensive protections to the enterprise, defending against threat actors and the spread of malware and ransomware. Guardicore’s micro-segmentation solution is designed to limit user access to only those applications that are authorized to communicate with each other. By denying communication … More →
The post Akamai acquires Guardicore to expand its zero trust security portfolio appeared first on Help Net Security.
In June 2012, Deloitte conducted an online survey of 50 C-suite and other executives about cyber threat detection and response and found that almost 87% of the pollees expected the number of cyberattacks targeting their organizations to increase over the next 12 months. Furthermore, 65% of the respondents cited ransomware as their greatest security concern in the next year. Ransomware attacks are not novel nor exotic. Knowing the dangers and the vulnerabilities, why is there … More →
The post Ransomware attacks on the rise – How to counter them? appeared first on Help Net Security.
Arthur Deane is a Senior Director at Capital One Financial, where he leads cybersecurity activities in the Card division. He is also the co-author of the Official (ISC)² CISSP CBK Reference, 6th edition. In this interview with Help Net Security, he discusses the book as well as certification in general. You are the co-author of the Official (ISC)² CISSP CBK Reference, now in it’s 6th edition. How long did it take to write and what … More →
The post Official (ISC)² CISSP CBK Reference: Out with the old, in with the new appeared first on Help Net Security.
In this interview with Help Net Security, Brandon Hoffman, CISO at Intel 471, talks about the growing threat of supply chain attacks, the most common supply chain vulnerabilities and how the right threat intelligence can help stay on top of these threats. We are witnessing a growing number of supply chain attacks lately, and cybercriminals are becoming stealthier and smarter. What are the common methods used by cybercriminals to carry out such attacks? Cybercriminals have … More →
The post Leveraging threat intelligence to tackle supply chain vulnerabilities appeared first on Help Net Security.
A Dimensional Research survey shares Kubernetes best practices and key insights about the rapidly growing and evolving use of Kubernetes within businesses. The findings of the survey highlight the need for continued innovation in the way Kubernetes and its related ecosystem are used and managed in real production environments in order to further bridge the gap between Information Technology Operations (ITOps) and Development Operations (DevOps) teams across organizations. The state of Kubernetes As enterprises grapple … More →
Ponemon Institute surveyed 597 IT and IT security professionals to understand how COVID-19 has impacted how healthcare delivery organizations (HDOs) protect patient care and patient information from increasing virulent cyberattacks, especially ransomware. For the first time, this research shows that ransomware attacks on healthcare organizations may have life-or-death consequences. Nearly one in four healthcare providers reported an increase in mortality rate due to ransomware. COVID-19 introduced new risk factors to HDOs The onset of COVID-19 … More →
The post Ransomware attacks on healthcare organizations may have life-or-death consequences appeared first on Help Net Security.
The typical enterprise manages over 50,000 publicly and privately trusted PKI certificates, a DigiCert survey shows. Manually managing this volume of certificates can lead to costly outages if not handled correctly. Two-thirds have experienced outages caused by certificates expiring unexpectedly and 25% have experienced five to six such outages in the past six months alone. Due to these issues and others, there is strong interest in adopting PKI automation. Leading organizations are six times more … More →
The post Certificates volume growing, most enterprises considering PKI automation to reduce risks appeared first on Help Net Security.
Despite high demand for strong data leadership, there is still much confusion and uncertainty about the Chief Data Officer (CDO) role. This is according to a study launched by Exasol, which found 50% of CDOs believe the value of their role is not yet recognized in the business world, while 46% say that organizations’ expectations for the CDO role are too high and are misinformed. This may explain why many organizations struggle to find the … More →
The post CDO role not yet recognized, expectations too high and misinformed appeared first on Help Net Security.
DataDome launched a new version of DataDome Online Fraud & Bot Management. This enhanced solution provides even more detailed, actionable insight into the specific threats businesses face – and that DataDome blocks – in real-time, as well as a benchmark of how threat levels compare to others in their industry. “By now, it’s well established that bots account for a significant portion of mobile and web traffic, and businesses are aware of the problem,” said … More →
The post DataDome enhances its online fraud and bot management solution appeared first on Help Net Security.
DTEX Systems announced a partnership with Splunk to deliver a zero-trust approach to insider risk intelligence, data loss prevention and security operations orchestration and response. Splunk and DTEX Systems are accelerating security response times and root cause analysis, driving faster event resolution with advanced analytics and reporting, as well as decreasing manual security and IT operations. DTEX InTERCEPT’s human-based endpoint telemetry provides the full context around the data, machines, applications, and people involved in an … More →
The post DTEX Systems collaborates with Splunk to deliver a zero-trust approach to insider risk intelligence appeared first on Help Net Security.
Guardicore announced a strategic engagement with Amdocs to implement its Centra Security Platform at Globe Telecom. The platform will enable Globe, one of the Philippines’ largest telecommunications providers, to gain visibility into network traffic across its entire infrastructure, significantly reducing its threat surface and mitigating advanced cyberthreats. By offering complete visibility into how Globe’s servers communicate internally and externally, the Centra platform will help Globe’s security team eliminate unnecessary connections and create strict controls over … More →
The post Guardicore partners with Amdocs to improve Globe’s cloud security environment appeared first on Help Net Security.
Ping Identity has acquired Singular Key, a no-code identity and security orchestration. Singular Key streamlines the integration of identity services, providing a no-code method of creating workflows across multiple identity technologies and platforms, including identity verification, fraud, risk, access management, privileged access, and identity governance into a unified identity fabric. With identity orchestration, enterprises can easily design and maintain dynamic user journeys for identity and access management across the entire lifecycle of identity. Singular Key’s … More →
The post Ping Identity acquires Singular Key to provide no-code identity orchestration for customers appeared first on Help Net Security.
SenseOn announced its $20m Series A funding round to scale its cloud native AI cybersecurity platform. The fundraise follows a year in which the company grew by more than 350%. The round was led by Eight Roads Ventures and was supported by existing investors MMC Ventures, Crane Venture Partners and Winton Ventures Limited. This fundraise comes at a time when hacks and breaches are proliferating – with the total number of records compromised in 2020 … More →
The post SenseOn raises $20M to scale its cloud native AI cybersecurity platform appeared first on Help Net Security.
1Password launched a new feature that will allow users to create and manage secure, unique email aliases from directly within 1Password. Partnering with Fastmail, an email service that puts people and their privacy first, the “Masked Email” integration adds an extra layer of privacy by giving users the option of hiding their actual email addresses from the apps or services that they use. According to research from Deloitte, 91% of all cyber attacks begin with … More →
The post 1Password now allows users to securely generate unique email aliases appeared first on Help Net Security.
Cloudflare announced its entry into email security with new offerings to help solve email challenges in an easy-to-use way that gives customers more control. Now, users will be able to create custom email addresses, manage incoming email routing, and prevent email spoofing and phishing on outgoing emails—all for free. Cloudflare also announced that customers can sign up for early access to its Advanced Email Security Suite, tightly integrated with all of Cloudflare’s Zero Trust solutions. … More →
The post Cloudflare announces free email offerings to prevent phishing and increase security appeared first on Help Net Security.
Companies are spending more than ever on cybersecurity but, despite a plethora of new security systems, they continue to be vulnerable to attacks, which are not only becoming more numerous but are also taking a greater financial and business toll on organizations. This is happening, I believe, because companies are approaching cybersecurity in the wrong way. Even though logic suggests that the more a company spends on cybersecurity systems the better protected it will be, … More →
The post To avoid cyberattacks, companies need to think like hackers appeared first on Help Net Security.
With each passing day, the threat of ransomware increases in frequency, sophistication, and effectiveness. What started as a simple annoyance scheme to collect a ransom has evolved into a mature ecosystem of Ransomware-as-a-Service (RaaS) providers leveraging double- and even triple-threat extortion tactics to ensure their demands are met. Today, no organization is safe. The RaaS marketplace has enabled both new and experienced cybercriminals to target specific organizations – based on size, industry, geography and whether … More →
The post The biggest problem with ransomware is not encryption, but credentials appeared first on Help Net Security.
VMware announced findings from a study on the relationship between IT, security, and development teams as organizations adopt a zero trust security model. The study found that security is still perceived as a barrier in organizations, with 52% of developers believing that security policies are stifling their innovation. Forrester Consulting surveyed 1,475 IT and security leaders and discovered that only 22% developers strongly agree that they understand which security policies they are expected to comply … More →
The post The relationship between development and security teams affects speed to market appeared first on Help Net Security.
Most enterprises are overconfident and lack the proper visibility to manage subsidiary risk, according to an Osterman Research study. The study surveyed enterprises with more than $1 billion in annual revenue and an average of more than 19 subsidiaries. M&A has become a standard path to rapid growth for many organizations. The global law firm White & Case reported that US M&A deal value reached a record high of US$1.27 trillion in the first half … More →
Copyright 2019 © All rights reserved