Category: HelpnetSecurity

We must adjust expectations for the CISO role
12
Dec
2024

We must adjust expectations for the CISO role

Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information…

Shaping effective AI governance is about balancing innovation with humanity
12
Dec
2024

Shaping effective AI governance is about balancing innovation with humanity

In this Help Net Security interview, Ben de Bont, CISO at ServiceNow, discusses AI governance, focusing on how to foster…

Keycloak: Open-source identity and access management
12
Dec
2024

Keycloak: Open-source identity and access management

Keycloak is an open-source project for identity and access management (IAM). It provides user federation, strong authentication, user management, authorization,…

Microsoft enforces defenses preventing NTLM relay attacks
11
Dec
2024

Microsoft enforces defenses preventing NTLM relay attacks

Since making Kerberos the default Windows authentication protocol in 2000, Microsoft has been working on eventually retiring NTLM, its less…

BadRAM: $10 hack unlocks AMD encrypted memory
11
Dec
2024

BadRAM: $10 hack unlocks AMD encrypted memory

Cybersecurity researchers have identified a vulnerability (CVE-2024-21944, aka BadRAM) affecting ADM processors that can be triggered by rogue memory modules…

Cato Networks extends SASE-based protection to IoT/OT environments
11
Dec
2024

Cato Networks extends SASE-based protection to IoT/OT environments

With the introduction of Cato IoT/OT Security, Cato Networks is enabling enterprises to simplify the management and security of Internet…

Trellix Drive Encryption enhances security against insider attacks
11
Dec
2024

Trellix Drive Encryption enhances security against insider attacks

Trellix announced Trellix Drive Encryption upgrades for on-premises and SaaS management. Customers benefit from the flexibility needed for encryption protection…

Containers have 600+ vulnerabilities on average
11
Dec
2024

Containers have 600+ vulnerabilities on average

Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are…

Open source malware up 200% since 2023
11
Dec
2024

Open source malware up 200% since 2023

Sonatype’s 2024 Open Source Malware Threat Report reveals that the number of malicious packages has surpassed 778,500 since tracking began…

Why crisis simulations fail and how to fix them
11
Dec
2024

Why crisis simulations fail and how to fix them

In this Help Net Security interview, Allison Ritter, Head of Cyber Experiential Exercising at Cyberbit, shares her insights on the…

Microsoft fixes exploited zero-day (CVE-2024-49138)
11
Dec
2024

Microsoft fixes exploited zero-day (CVE-2024-49138)

On December 2024 Patch Tuesday, Microsoft resolved 71 vulnerabilities in a variety of its products, including a zero-day (CVE-2024-49138) that’s…

US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks
10
Dec
2024

US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks

The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for…