Category: HelpnetSecurity

Managing the risks of unstructured data growth
03
Apr
2023

Managing the risks of unstructured data growth

Locating and identifying sensitive data, including defense-in-depth strategies where a series of mechanisms are layered to protect valuable information, should…

Rookout's Snapshots: The fourth pillar of observability for more secure applications
03
Apr
2023

Rookout’s Snapshots: The fourth pillar of observability for more secure applications

Liran Haimovitch, CTO and co-founder of Rookout, with his extensive background in cybersecurity within the Israeli government, has a unique…

Passbolt: Open-source password manager for security-conscious organizations
03
Apr
2023

Passbolt: Open-source password manager for security-conscious organizations

In this Help Net Security interview, Kevin Muller, CEO at Passbolt, delves into the critical concerns linked to password usage,…

Millions still exposed despite available fixes
03
Apr
2023

Millions still exposed despite available fixes

Although KEV catalog vulnerabilities are frequent targets of APT Groups, a large and exploitable attack surface remains due to software…

Week in review: 3CX supply chain attack, ChatGPT data leak
02
Apr
2023

Week in review: 3CX supply chain attack, ChatGPT data leak

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Visa fraud expert outlines the…

OSC&R open software supply chain attack framework now on GitHub
31
Mar
2023

OSC&R open software supply chain attack framework now on GitHub

OSC&R (Open Software Supply Chain Attack Reference) is an open framework for understanding and evaluating software supply chain security threats….

The foundation of a holistic identity security strategy
31
Mar
2023

The foundation of a holistic identity security strategy

Only 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud…

Overcoming obstacles to introduce zero-trust security in established systems
31
Mar
2023

Overcoming obstacles to introduce zero-trust security in established systems

In this Help Net Security interview, Michal Cizek, CEO at GoodAccess, discusses the crucial balance between leveraging distributed resources and…

New infosec products of the week: March 31, 2023
31
Mar
2023

New infosec products of the week: March 31, 2023

Here’s a look at the most interesting products from the past week, featuring releases from BreachLock, HackNotice, LOKKER, Nile, and…

Cloud diversification brings complex data management challenges
31
Mar
2023

Cloud diversification brings complex data management challenges

As IT infrastructure becomes more diverse, organizations face the challenge of integrating data management and control, according to Nutanix. The…

Intruder unveils API scanning to help organizations reduce exposure
31
Mar
2023

Intruder unveils API scanning to help organizations reduce exposure

Intruder updates its cloud-based vulnerability management service, allowing organisations of all sizes to secure their APIs by automatically detecting vulnerabilities,…

Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)
30
Mar
2023

Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)

Attackers are exploiting a critical vulnerability (CVE-2022-47986) in the IBM Aspera Faspex centralized file transfer solution to breach organizations. About…