Category: HelpnetSecurity

Three cybersecurity actions that make a difference
19
Jun
2023

Three cybersecurity actions that make a difference

Organizations that closely align their cybersecurity programs to business objectives are 18% more likely to achieve target revenue growth and…

Untangling the web of supply chain security with Tony Turner
19
Jun
2023

Untangling the web of supply chain security with Tony Turner

Decades ago, Tony Turner, CEO of Opswright and author of Software Transparency: Supply Chain Security in an Era of a…

Week in review: Fortinet patches pre-auth RCE, Switzerland under cyberattack
18
Jun
2023

Week in review: Fortinet patches pre-auth RCE, Switzerland under cyberattack

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building a culture of security…

Red teaming can be the ground truth for CISOs and execs
16
Jun
2023

Red teaming can be the ground truth for CISOs and execs

This year, against the backdrop of attacks on everyone from healthcare institutions and schools to financial services organizations, as well…

New infosec products of the week: June 16, 2023
16
Jun
2023

New infosec products of the week: June 16, 2023

Here’s a look at the most interesting products from the past week, featuring releases from NETSCOUT, Okta, Quantinuum, Seceon, and…

Cybercriminals return to business as usual in a post-pandemic world
16
Jun
2023

Cybercriminals return to business as usual in a post-pandemic world

After two years of pandemic-induced disruption, 2022 was a return to business as usual for the world’s cybercriminals, according to…

Cybersecurity culture improves despite the dark clouds of the past year
16
Jun
2023

Cybersecurity culture improves despite the dark clouds of the past year

Despite a hardening economic climate, heightened global tensions and the onset of new technology making cybercrime easier, 76% of the…

How secure is your vehicle with digital key technology?
15
Jun
2023

How secure is your vehicle with digital key technology?

Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the…

Cyber debt levels reach tipping point
15
Jun
2023

Cyber debt levels reach tipping point

The tension between difficult economic conditions and the pace of technology innovation, including the evolution of AI, is influencing the…

Fiddler Auditor: Open-source tool evaluates the robustness of large language models
15
Jun
2023

Fiddler Auditor: Open-source tool evaluates the robustness of large language models

Fiddler Auditor is an open-source tool designed to evaluate the robustness of Large Language Models (LLMs) and Natural Language Processing…

Small organizations outpace large enterprises in MFA adoption
15
Jun
2023

Small organizations outpace large enterprises in MFA adoption

The use of MFA has nearly doubled since 2020 and that phishing-resistant authenticators represent the best choice in terms of…

Okta Device Access enables businesses to secure access to both devices and applications
14
Jun
2023

Okta Device Access enables businesses to secure access to both devices and applications

Okta announced Okta Device Access, a new product that enables organizations to extend Okta’s Identity and Access Management (IAM) capabilities…