Category: HelpnetSecurity

Using AI/ML to optimize your tech stack and enhance business efficiency
19
Jul
2023

Using AI/ML to optimize your tech stack and enhance business efficiency

In this Help Net Security interview, Arthur Hu, SVP, Global CIO and Services & Solutions Group CTO at Lenovo, discusses…

Trends in ransomware-as-a-service and cryptocurrency to monitor
19
Jul
2023

Trends in ransomware-as-a-service and cryptocurrency to monitor

In January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business…

Supply chain executives unaware of growing customer trust issues
19
Jul
2023

Supply chain executives unaware of growing customer trust issues

Supply chain executives significantly overestimate stakeholder trust in their supply chain capabilities and intentions, according to Deloitte. Of more than…

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline
19
Jul
2023

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Improve your cloud security with these 9 proven strategies. Uptycs, alongside renowned expert Lee Atchison, share their list of comprehensive…

Splunk Edge Hub provides visibility across IT and OT environments
18
Jul
2023

Splunk Edge Hub provides visibility across IT and OT environments

Splunk announced Splunk Edge Hub, a new solution that simplifies the ingestion and analysis of data generated by sensors, IoT…

Adobe ColdFusion vulnerabilities exploited to deliver web shells (CVE-2023-29298, CVE-2023-38203)
18
Jul
2023

Adobe ColdFusion vulnerabilities exploited to deliver web shells (CVE-2023-29298, CVE-2023-38203)

Attackers are exploiting two Adobe ColdFusion vulnerabilities (CVE-2023-29298, CVE-2023-38203) to breach servers and install web shells to enable persistent access…

KYB by ComplyAdvantage automates customer onboarding and monitoring
18
Jul
2023

KYB by ComplyAdvantage automates customer onboarding and monitoring

One of the biggest challenges faced by regulated and non-regulated companies is assessing whether or not another business is safe…

Healthcare organizations in the crosshairs of cyberattackers
18
Jul
2023

Healthcare organizations in the crosshairs of cyberattackers

In an era where cyber threats continue to evolve, healthcare organizations are increasingly targeted by malicious actors employing multiple attack…

12 open-source penetration testing tools you might not know about
18
Jul
2023

12 open-source penetration testing tools you might not know about

Red Siege has developed and made available many open-source tools to help with your penetration testing work. The company plans…

Broadband consumers demand security and sustainability
18
Jul
2023

Broadband consumers demand security and sustainability

Consumer expectations will reshape the needs and economics of the internet, according to Cisco. People in EMEA are rethinking what…

Data compromises on track to set a new record
18
Jul
2023

Data compromises on track to set a new record

The number of data compromises reported in the U.S. in the H1 of 2023 is higher than the total compromises…

Growing a 15,000 strong automotive cybersecurity group with John Heldreth
17
Jul
2023

Growing a 15,000 strong automotive cybersecurity group with John Heldreth

The furry in which the automotive community pried, prodded, and eventually outsmarted existing functions that are software-driven is nothing short…