Category: HelpnetSecurity

Google on scaling differential privacy across nearly three billion devices
31
Oct
2024

Google on scaling differential privacy across nearly three billion devices

In this Help Net Security interview, Miguel Guevara, Product Manager, Privacy Safety and Security at Google, discusses the complexities involved…

Cynet enables 426% ROI in Forrester Total Economic Impact Study
31
Oct
2024

Cynet enables 426% ROI in Forrester Total Economic Impact Study

Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted…

North Korean hackers pave the way for Play ransomware
31
Oct
2024

North Korean hackers pave the way for Play ransomware

North Korean state-sponsored hackers – Jumpy Pisces, aka Andariel, aka Onyx Sleet – have been spotted burrowing into enterprise systems,…

IoT needs more respect for its consumers, creations, and itself
31
Oct
2024

IoT needs more respect for its consumers, creations, and itself

Yet again, connected devices are in the news for all the wrong reasons. In October, security researchers found that robot…

How agentic AI handles the speed and volume of modern threats
31
Oct
2024

How agentic AI handles the speed and volume of modern threats

In this Help Net Security interview, Lior Div, CEO at Seven AI, discusses the concept of agentic AI and its…

99% of CISOs work extra hours every week
31
Oct
2024

99% of CISOs work extra hours every week

The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program…

Ransomware hits web hosting servers via vulnerable CyberPanel instances
30
Oct
2024

Ransomware hits web hosting servers via vulnerable CyberPanel instances

A threat actor – or possibly several – has hit approximately 22,000 vulnerable instances of CyberPanel and encrypted files on…

XM Cyber Vulnerability Risk Management boosts prioritization with actual impact analysis
30
Oct
2024

XM Cyber Vulnerability Risk Management boosts prioritization with actual impact analysis

XM Cyber launched its innovative Vulnerability Risk Management (VRM) solution, extending its Continuous Exposure Management Platform. This new approach to…

Neon Authorize: Granular access controls at the database layer
30
Oct
2024

Neon Authorize: Granular access controls at the database layer

Neon, the serverless Postgres database built for developers, launched Neon Authorize. It enables developers to manage permissions and access controls…

Product showcase: Shift API security left with StackHawk
30
Oct
2024

Product showcase: Shift API security left with StackHawk

With the proliferation of APIs, and the speed at which AI functionality is helping fuel innovation, a strategic approach for…

Russian hackers deliver malicious RDP configuration files to thousands
30
Oct
2024

Russian hackers deliver malicious RDP configuration files to thousands

Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is…

Simplifying decentralized identity systems for everyday use
30
Oct
2024

Simplifying decentralized identity systems for everyday use

In this Help Net Security interview, Carla Roncato, VP of Identity at WatchGuard Technologies, discusses how companies can balance privacy,…