Category: HelpnetSecurity

The Ultimate Guide to the CCSP
05
Dec
2024

The Ultimate Guide to the CCSP

Even the brightest minds benefit from guidance on the journey to success.The Ultimate Guide to the CCSP covers everything you…

Tenable Patch Management prevents problematic updates
05
Dec
2024

Tenable Patch Management prevents problematic updates

Tenable released Tenable Patch Management, an autonomous patch solution built to close vulnerability exposures in a unified solution. A strategic…

How the Shadowserver Foundation helps network defenders with free intelligence feeds
05
Dec
2024

How the Shadowserver Foundation helps network defenders with free intelligence feeds

In this Help Net Security interview, Piotr Kijewski, CEO of The Shadowserver Foundation, discusses the organization’s mission to enhance internet…

Preparing for Q-day: The essential role of cloud migration in securing enterprise data
05
Dec
2024

Preparing for Q-day: The essential role of cloud migration in securing enterprise data

As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This…

Product showcase: Securing Active Directory passwords with Specops Password Policy
04
Dec
2024

Product showcase: Securing Active Directory passwords with Specops Password Policy

Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a…

PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)
04
Dec
2024

PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)

Researchers have published a proof-of-concept (PoC) exploit for CVE-2024-8785, a critical remote code execution vulnerability affecting Progress WhatsUp Gold, a…

FortiAppSec Cloud simplifies web application security management
04
Dec
2024

FortiAppSec Cloud simplifies web application security management

Fortinet announced FortiAppSec Cloud, a new cloud-delivered platform that integrates key web application security and performance management tools into a…

Veza Access Requests reduces the risk of identity-based threats
04
Dec
2024

Veza Access Requests reduces the risk of identity-based threats

Veza announced Veza Access Requests product, enabling organizations to reduce the risk of identity-based threats with automated access policy intelligence…

65% of office workers bypass cybersecurity to boost productivity
04
Dec
2024

65% of office workers bypass cybersecurity to boost productivity

High-risk access exists throughout the workplace, in almost every job role, proving that the time has come for organizations to…

SafeLine: Open-source web application firewall (WAF)
04
Dec
2024

SafeLine: Open-source web application firewall (WAF)

SafeLine is an open-source and self-hosted Web Application Firewall (WAF) that protects websites from cyber attacks. “SafeLine WAF was created…

Securing AI's new frontier: Visibility, governance, and mitigating compliance risks
04
Dec
2024

Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks

In this Help Net Security interview, Niv Braun, CEO at Noma Security, discusses the difficulties security teams face due to…

70% of open-source components are poorly or no longer maintained
04
Dec
2024

70% of open-source components are poorly or no longer maintained

The geographic distribution of open-source contributions introduces geopolitical risks that organizations must urgently consider, especially with rising nation-state attacks, according…