Category: HelpnetSecurity

How agentic AI handles the speed and volume of modern threats
31
Oct
2024

How agentic AI handles the speed and volume of modern threats

In this Help Net Security interview, Lior Div, CEO at Seven AI, discusses the concept of agentic AI and its…

99% of CISOs work extra hours every week
31
Oct
2024

99% of CISOs work extra hours every week

The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program…

Ransomware hits web hosting servers via vulnerable CyberPanel instances
30
Oct
2024

Ransomware hits web hosting servers via vulnerable CyberPanel instances

A threat actor – or possibly several – has hit approximately 22,000 vulnerable instances of CyberPanel and encrypted files on…

XM Cyber Vulnerability Risk Management boosts prioritization with actual impact analysis
30
Oct
2024

XM Cyber Vulnerability Risk Management boosts prioritization with actual impact analysis

XM Cyber launched its innovative Vulnerability Risk Management (VRM) solution, extending its Continuous Exposure Management Platform. This new approach to…

Neon Authorize: Granular access controls at the database layer
30
Oct
2024

Neon Authorize: Granular access controls at the database layer

Neon, the serverless Postgres database built for developers, launched Neon Authorize. It enables developers to manage permissions and access controls…

Product showcase: Shift API security left with StackHawk
30
Oct
2024

Product showcase: Shift API security left with StackHawk

With the proliferation of APIs, and the speed at which AI functionality is helping fuel innovation, a strategic approach for…

Russian hackers deliver malicious RDP configuration files to thousands
30
Oct
2024

Russian hackers deliver malicious RDP configuration files to thousands

Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is…

Simplifying decentralized identity systems for everyday use
30
Oct
2024

Simplifying decentralized identity systems for everyday use

In this Help Net Security interview, Carla Roncato, VP of Identity at WatchGuard Technologies, discusses how companies can balance privacy,…

Risk hunting: A proactive approach to cyber threats
30
Oct
2024

Risk hunting: A proactive approach to cyber threats

Cybersecurity is an overly reactive industry. Too often we act like firefighters, rushing from blaze to blaze, extinguishing flames hoping…

6 key elements for building a healthcare cybersecurity response plan
30
Oct
2024

6 key elements for building a healthcare cybersecurity response plan

Medical practices remain vulnerable to cyberattacks, with over a third unable to cite a cybersecurity incident response plan, according to…

Securiti Gencore AI accelerates GenAI adoption in the enterprise
29
Oct
2024

Securiti Gencore AI accelerates GenAI adoption in the enterprise

Securiti released Gencore AI, a holistic solution to easily build safe, enterprise-grade GenAI systems, copilots and AI agents. This new…

The Cloud Latency Map measures latency across 100+ cloud regions
29
Oct
2024

The Cloud Latency Map measures latency across 100+ cloud regions

Kentik launched The Cloud Latency Map, a free public tool allowing anyone to explore the latencies measured between over 100…