Category: HelpnetSecurity

Microsoft introduces new access policies in Entra to boost MFA usage
07
Nov
2023

Microsoft introduces new access policies in Entra to boost MFA usage

As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID…

Kentik Kube collects metadata across Kubernetes pods, clusters, and services
07
Nov
2023

Kentik Kube collects metadata across Kubernetes pods, clusters, and services

Kentik, the network observability company, has released Kentik Kube, a solution that reveals how Kubernetes traffic routes through organizations’ data…

Malwarebytes ThreatDown helps organizations to overpower threats
07
Nov
2023

Malwarebytes ThreatDown helps organizations to overpower threats

Malwarebytes launched ThreatDown, the product family that protects IT-constrained organizations with effective, easy-to-use cybersecurity. Formerly named Malwarebytes for Business, ThreatDown…

7 free cyber threat maps showing attack intensity and frequency
07
Nov
2023

7 free cyber threat maps showing attack intensity and frequency

Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations…

Kubescape 3.0 elevates open-source Kubernetes security
07
Nov
2023

Kubescape 3.0 elevates open-source Kubernetes security

Targeted at the DevSecOps practitioner or platform engineer, Kubescape, the open-source Kubernetes security platform has reached version 3.0. Vulnerability scan…

Microsegmentation proves its worth in ransomware defense
07
Nov
2023

Microsegmentation proves its worth in ransomware defense

The number of ransomware attacks (successful and unsuccessful) has doubled over the past two years, from 43 on average in…

Outdated cryptographic protocols put vast amounts of network traffic at risk
07
Nov
2023

Outdated cryptographic protocols put vast amounts of network traffic at risk

Cryptography is largely taken for granted – rarely evaluated or checked – a practice that could have devastating consequences for…

eBook: Keeping Active Directory out of hackers' cross-hairs
07
Nov
2023

eBook: Keeping Active Directory out of hackers’ cross-hairs

Active Directory is a prime target for threat actors, and companies must act now to eliminate it as a threat…

Palo Alto Networks to acquire Talon Cyber Security
06
Nov
2023

Palo Alto Networks to acquire Talon Cyber Security

Palo Alto Networks has entered into a definitive agreement to acquire Talon Cyber Security, a pioneer of Enterprise Browser technology….

Okta breach post mortem reveals weaknesses exploited by attackers
06
Nov
2023

Okta breach post mortem reveals weaknesses exploited by attackers

The recent breach of the Okta Support system was carried out via a compromised service account with permissions to view…

Google Play will mark independently validated VPN apps
06
Nov
2023

Google Play will mark independently validated VPN apps

Android VPN apps that have gone through an independent security validation will now be able to claim that distinction on…

How global password practices are changing
06
Nov
2023

How global password practices are changing

Password health and hygiene improved globally over the past year, reducing the risk of account takeover for consumers and businesses,…