Europe Edition

» Auto updated continuously

• Source limited to: Help Net Security

 2021-05-26 04:30 

Help Net Security

Label standard and best practices for Kubernetes security...

This article talks about label standard and best practices for Kubernetes security, a common area where I see organizations struggle to define the set of labels required to meet their security requirements. My advice is to always start with a hierarchical...

 2021-05-26 04:00 

Help Net Security

Enhancing cyber resilience in the oil and gas industry...

The World Economic Forum (WEF) has brought together industry and cybersecurity experts from companies and organizations such as Siemens Corp, Saudi Aramco, Royal Dutch Shell, the Cyber Security Agency of Singapore, the U.S. CISA, industrial cybersecurity ...

 2021-05-26 03:30 

Help Net Security

Cybersecurity leaders lacking basic cyber hygiene...

Constella Intelligence released the results of a survey that unlocks the behaviors and tendencies that characterize how vigilant organizations' leaders are when it comes to reducing cyber vulnerability, allowing the industry to better understand how s...

 2021-05-26 03:00 

Help Net Security

How do we decide whether or not to trust AI systems?...

Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in music and make song recommendations that improve based on your interactions. However, AI...

 2021-05-26 02:30 

Help Net Security

Imperva introduces Serverless Protection to secure serverless computing functions...

Imperva launches Imperva Serverless Protection, a new product built to secure organizations from vulnerabilities created by misconfigured apps and code-level security risks in serverless computing environments. Designed with the developer and security tea...

 2021-05-26 02:00 

Help Net Security

Onfido Face Authenticate enables businesses to authenticate customers' real identities...

Onfido announced Onfido Face Authenticate, which adds a fast and seamless biometric face authenticator as well as new security tools, including Onfido Private Key Encryption, to its Real Identity Platform. The new product suite provides businesses with th...

 2021-05-26 01:30 

Help Net Security

Juniper Networks Apstra 4.0 enhances the experience of users and operators in the data center...

Juniper Networks announced version 4.0 of Apstra software, the intent-based networking solution acquired earlier in the year. Juniper Apstra helps organizations to minimize the time and costs associated with deploying and managing traditionally complex da...

 2021-05-26 01:00 

Help Net Security

Datadog's AWS Lambda extension allows customers to collect telemetry from serverless applications...

Datadog announced the general availability of Datadog's AWS Lambda extension. This feature enables engineering teams to send their metrics, traces, and logs securely to Datadog with minimal overhead to their business-critical serverless applications. ...

 2021-05-26 00:45 

Help Net Security

Aruba's Wi-Fi 6E solution set supports high-bandwidth applications and use cases...

Aruba announced the Wi-Fi 6E solution set the 630 Series of campus access points (APs), starting with the AP-635. The latest innovation in Wi-Fi technology, Wi-Fi 6E refers to Wi-Fi devices that operate in the 6 GHz band, which was in the largest expansio...

 2021-05-26 00:30 

Help Net Security

PLDA launches XpressRICH PCI Express 6.0 Controller IP for SoC designers and system architects...

PLDA announced the launch of their XpressRICH PCI Express (PCIe) Controller IP for the PCIe 6.0 specification. The PCIe 6.0 specification provides an evolutionary step forward by doubling the data rate to 64 GT/s link rate negotiation. PCIe 6.0 architectu...

 2021-05-26 00:00 

Help Net Security

(ISC) announces registration opening for its 11th annual Security Congress...

(ISC) announced that registration is now open for its 11th annual (ISC) Security Congress taking place online and at the Hyatt Regency Orlando in Orlando, FL from October 18-20. Focused on continuing education for security professionals, the three-day Sec...

 2021-05-25 23:45 

Help Net Security

Inseego collaborates with Net4 to bring the benefits of private 5G infrastructure to enterprise networks...

Inseego announced a collaboration with Net4 to drive and simplify the deployment of 5G private networks for enterprise customers across the United Kingdom and Europe. The joint solution will leverage Net4's platform for ultra-reliable 5G connectivity ...

 2021-05-25 23:30 

Help Net Security

Ermetic partners with IDSA to address risks associated with over privileged cloud identities...

Ermetic announced it will work with the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral education and resources to help organizations reduce the risk of a breach by combining identity and security strategies, on initiat...

 2021-05-25 23:15 

Help Net Security

Cadence unveiled its third-generation 112G long-reach (112G-LR) SerDes IP on TSMC's N5 process...

Cadence Design Systems unveiled its third-generation 112G long-reach (112G-LR) SerDes IP on TSMC's N5 process for hyperscale ASICs, artificial intelligence/machine learning (AI/ML) accelerators, and switch fabric systems on chip (SoCs). The Cadence 11...

 2021-05-25 22:45 

Help Net Security

Tessian raises $65M to accelerate its mission of preventing human risk in global enterprises...

Human Layer Security company Tessian announces that it has raised $65 million in Series C venture capital funding to accelerate its mission of quantifying and preventing human risk in global enterprises, and empowering people to do their best work without...

 2021-05-25 22:30 

Help Net Security

SailPoint appoints Wendy Wu as CMO...

SailPoint announced the appointment of Wendy Wu as Chief Marketing Officer. Wendy's appointment will build on a period of strong demand for SailPoint's Identity Platform and support SailPoint's continued growth. "Wendy is a savvy, growth-f...

 2021-05-25 11:58 

Help Net Security

Apple fixes macOS zero-day exploited by malware (CVE-2021-30713)...

A zero-day vulnerability (CVE-2021-30713) that allowed XCSSET malware to surreptitiously take screenshots of the victim's desktop has been fixed by Apple on macOS 11.4 (Big Sur) on Monday. The XCSSET malware and its CVE-2021-30713 exploitation Discove...

 2021-05-25 08:29 

Help Net Security

Happy birthday GDPR: IoT impact and practical tips for compliance...

With the GDPR now in its third year, compliance with the EU data privacy regulation is still a significant issue for organizations to tackle, especially especially when it comes to the Internet of Things (IoT). Additionally, with remote work currently bei...

 2021-05-25 05:30 

Help Net Security

A leadership guide for mitigating security risks with low code platforms...

The low code market continues to grow, increasingly finding adoption for more diverse and serious applications among enterprises and independent software vendors (ISVs). The lingering question of application code security follows, as stories of security b...

 2021-05-25 05:00 

Help Net Security

Security must become frictionless for companies to fully secure themselves...

Ensuring adequate security in the face of a rapid increase in the quantity and sophistication of cyberattacks requires more effort and resources than most organizations are typically capable of providing for themselves. Many businesses, organizations, and...

 2021-05-25 04:30 

Help Net Security

Thoughts on Biden's cybersecurity Executive Order...

Colonial Pipeline is a major American oil pipeline system that originates in Houston TX and supplies gasoline and jet-fuel to a significant portion of the US, specifically the South-Eastern US. The ransomware attack that hit their computing environment br...

 2021-05-25 04:00 

Help Net Security

Victims lose millions to healthcare related eCrime...

Victim losses from healthcare related eCrime in the U.S. rose by 2,473 percent during 2020 as the COVID-19 pandemic swept through the nation and world, CrowdStrike reveals. Healthcare eCrime describes a scheme attempting to defraud private or government h...

 2021-05-25 03:30 

Help Net Security

Consumers ID theft concerns only growing...

A Benenson Strategy Group study surveyed over 700 adults on their concerns about ID theft and cybercrime, the type of help they feel they would need to address those concerns, and which institutions they trust with alleviating those concerns. Chris Carnic...

 2021-05-25 03:00 

Help Net Security

FWaaS market continues to grow...

The Firewall-as-a-Service (FWaaS) market is anticipated to witness a CAGR of 22% between 2021 and 2026, according to ResearchAndMarkets. Flexible scalability, secure access parity, security over migration, identity protection, and secure performance manag...

 2021-05-25 01:00 

Help Net Security

IDQ launches Cerberis XG, a QKD system that generates and distributes provably secure keys...

Safety of current encryption methods, and especially of the key exchange mechanisms based on asymmetric cryptography, is a major concern today particularly for governments and enterprises which must protect data for five to ten years or more. Possible bac...

 2021-05-25 00:00 

Help Net Security

StorMagic and Zerto have been validated with HPE Proliant servers to protect data intensive workloads...

StorMagic announced that StorMagic SvSAN and Zerto have been validated with HPE Proliant servers. Delivered through the HPE Complete Program, this HPE validated solution allows customers to protect edge-to-edge, edge-to-core or edge-to-cloud workloads. &#...

 2021-05-24 23:30 

Help Net Security

CrowdStrike and EY expand alliance to help businesses grow their resiliency and security posture...

CrowdStrike and Ernst & Young announced that CrowdStrike Falcon has been selected as one of the EY preferred cybersecurity technology platforms, strengthening the alliance between the two organizations. The development of the alliance introduces an expans...

 2021-05-24 23:00 

Help Net Security

Paian IT Solutions selects Corent Technology's ComPaaS to help clients adopt cloud services...

Paian IT Solutions and Corent Technology announce the extension of their existing partnership, adding optimization and modernization of Microsoft Azure for customers using Corent Technology's SurPaaS ComPaaS platform. Paian IT Solutions is a provider ...

 2021-05-24 22:45 

Help Net Security

Aqua Security researchers tapped by the MITRE team to contribute to new container framework...

Aqua Security announced that its Team Nautilus researchers were tapped by the MITRE ATT&CK team to contribute to the development of the new Container Framework. Aqua's contributions help to create a foundation for cloud security methodologies and shap...

 2021-05-24 22:15 

Help Net Security

Chris Lyon joins ForgeRock as SVP and global head of engineering...

ForgeRock announced the appointment of Chris Lyon as senior vice president and global head of engineering. In his new role, Lyon will lead global engineering and report to ForgeRock's chief product officer (CPO) Peter Barker. "Chris is an innovati...

 2021-05-24 06:00 

Help Net Security

How do I select a data management solution for my business?...

A continuous data growth has become the number one challenge for data management. To tackle these challenges, organizations should look for tools and platforms they can trust and which will allow them to keep data secure while not disrupting their busines...

 2021-05-24 05:30 

Help Net Security

Can zero trust kill our need to talk about locations?...

As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise vs cloud infrastructure, or access management for branch offices vs remote worke...

 2021-05-24 05:00 

Help Net Security

How data manipulation could be used to trick fraud detection algorithms on e-commerce sites...

As the marketing of almost every advanced cybersecurity product will tell you, artificial intelligence is already being used in many products and services that secure computing infrastructure. But you probably haven't heard much about the need to secu...

 2021-05-24 04:30 

Help Net Security

Returning to the office? Time to reassess privileged access permissions...

As more of the population becomes vaccinated against COVID-19, organizations are preparing to return to the office. In the emerging hybrid environment, where employees can login from anywhere at any time, cybercriminals have an expanded attack surface and...

 2021-05-24 04:00 

Help Net Security

How to implement cybersecurity for modern application connectivity...

The president's recent executive order on improving the nation's cybersecurity highlights the security threats facing our country — and it couldn't be more timely. Ransomware has been an ever-present threat to hospitals, financial instit...

 2021-05-24 03:30 

Help Net Security

The state of AppSec and the journey to DevSecOps...

While the perceived benefits of DevSecOps to both security and DevOps are high, much progress must be made in defining a repeatable and consistent governance model for true DevSecOps to take hold, a ZeroNorth survey of 250 global security, DevOps and IT p...

 2021-05-24 03:00 

Help Net Security

How willing are enterprise leaders to use top emerging technologies?...

Emerging technologies can bring the potential for increased efficiencies, cost savings and improved security for enterprises, among other benefits—but also risk that must be weighed when considering adoption. An ISACA survey report offers insights i...

 2021-05-24 02:30 

Help Net Security

vCISO Clinic helps resource-constrained InfoSec leaders...

InfoSec leaders face a strange dilemma. On one hand, there are hundreds of thousands of online resources available if they have questions that's a benefit of a digital-first field. On the other hand, most leaders face challenges that while not entirel...

 2021-05-23 08:55 

Help Net Security

Week in review: Dealing with ransomware attacks, detecting use of stolen API credentials inside AWS...

Here's an overview of some of last week's most interesting news, articles and podcasts: Vulnerability in popular browsers could be used to track, profile users online A vulnerability affecting desktop versions of four popular web browsers could be...

 2021-05-22 00:00 

Help Net Security

IDrive Mirror secures cloud-based full image backups for Windows computers and server operating systems...

IDrive Cloud Backup has released IDrive Mirror, providing secure, cloud-based full image backups for Windows computers and server operating systems for protection against data loss and dreaded ransomware. IDrive Mirror gives individuals and small business...

 2021-05-21 23:00 

Help Net Security

DataStax collaborates with NetApp to adopt and manage high scale, cloud native data...

DataStax announced a collaboration with NetApp to deliver full lifecycle management for cloud native data in its DataStax Enterprise database as well as open source Apache Cassandra clusters. As part of this partnership, the two companies have worked toge...

 2021-05-21 22:45 

Help Net Security

CyberLink partners with ACE Biotek for a fully automated solution to control access...

CyberLink announced a partnership with ACE Biotek, by integrating its FaceMe AI facial recognition engine into ACE Biotek's Wallie Screen Access Control and Health Screening System, providing a quick, fully automated solution to control access and che...

 2021-05-21 22:30 

Help Net Security

HackerOne hires new leaders to drive the product roadmap...

HackerOne announced that it is doubling down on its investment in innovation with the hiring of new leaders to drive the product roadmap. Ashish Warty has come aboard as Senior Vice President of Engineering and Rand Wacker has joined the company as Senior...

 2021-05-21 22:15 

Help Net Security

Socure appoints Gary Sevounts as CMO...

Socure announced the appointment of Gary Sevounts as its chief marketing officer (CMO). Sevounts, an award-winning marketer with more than 20 years of industry experience, brings an extensive marketing background in the areas of identity fraud, risk, and ...

 2021-05-21 10:39 

Help Net Security

Fake Amazon order emails lead to vishing...

Fraudsters are sending out fake Amazon order emails and tricking online shoppers into calling a telephone number manned by them to steal the shoppers' credit card details and other sensitive information. The fake Amazon order emails Armorblox has rece...

 2021-05-21 06:00 

Help Net Security

New infosec products of the week: May 21, 2021...

ReversingLabs Malware Lab: Detect, classify, analyze, and respond to malicious files Designed to support modern security organizations increasingly delegating malware analysis to specific security operations (SOC) or development security operations (DevSe...

 2021-05-21 05:30 

Help Net Security

Cybersecurity, emerging technology and systemic risk: What it means for the medical device industry?...

In late 2020, the World Economic Forum stated that "the approach to cybersecurity needs to be overhauled before the industry finds itself in any fit state to tackle the threat." The WEF singled out five global cybersecurity challenges: 1. Increasi...

 2021-05-21 05:00 

Help Net Security

Three smart ways SMBs can improve cybersecurity...

Most of us wouldn't automatically equate small to medium-size businesses (SMBs) with having the most stringent security strategies. For starters, they don't exactly operate with large budgets. That means less money for IT staff, let alone highly t...

 2021-05-21 04:30 

Help Net Security

Top application security challenges: Bad bots, broken APIs, and supply chain attacks...

Vanson Bourne surveyed 750 application security decision makers responsible for their organization's application development and security to get their perspectives on data breaches, top application security vulnerabilities, and the most important prod...

 2021-05-21 04:00 

Help Net Security

Mobile stalkerware is on the rise...

Mobile stalkerware, which is software silently installed by stalkers onto victims' mobile devices without their knowledge, is on the rise, an ESET research finds. In 2019, ESET telemetry recorded almost five times more Android stalkerware detections t...

  • Need an account?  
    or