Category: HelpnetSecurity

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity
29
Jan
2024

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures….

Third-party risk management best practices and why they matter
29
Jan
2024

Third-party risk management best practices and why they matter

With organizations increasingly relying on third-party vendors, upping the third-party risk management (TPRM) game has become imperative to prevent the…

Global critical infrastructure faces relentless cyber activity
29
Jan
2024

Global critical infrastructure faces relentless cyber activity

In the last year, the world’s critical infrastructure – the medical, power, communications, waste, manufacturing, and transportation equipment that connects…

Week in review: 15 million Trello users’ scraped data on sale, attackers can steal NTLM hashes
28
Jan
2024

Week in review: 15 million Trello users’ scraped data on sale, attackers can steal NTLM hashes

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The reality of hacking threats…

Essential questions for developing effective human rights policies
26
Jan
2024

Essential questions for developing effective human rights policies

Growing environmental, social, and governance (ESG) expectations and expanding global regulation are propelling organizations to consider implementing a stand-alone human…

New infosec products of the week: January 26, 2024
26
Jan
2024

New infosec products of the week: January 26, 2024

Here’s a look at the most interesting products from the past week, featuring releases from 1Kosmos, Atakama, Onfido, Regula, Searchlight…

Longer passwords aren't safe from intensive cracking efforts
26
Jan
2024

Longer passwords aren’t safe from intensive cracking efforts

88% of organizations still use passwords as their primary method of authentication, according to Specops Software. The report found that…

Emerging trends and strategies in digital forensics
26
Jan
2024

Emerging trends and strategies in digital forensics

In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of…

Budget cuts loom for data privacy initiatives
26
Jan
2024

Budget cuts loom for data privacy initiatives

The past year saw developments and updates to privacy regulations across the globe—from India’s Personal Data Protection Bill to Brazil’s…

1Kosmos BlockID 1Key secures users in restricted environments
25
Jan
2024

1Kosmos BlockID 1Key secures users in restricted environments

1Kosmos announced BlockID 1Key, a biometric security key to provide a phishing-resistant passwordless multi-factor authentication option for Sensitive Compartmented Information…

Searchlight Cyber adds AI-powered language translation to simplify dark web investigations
25
Jan
2024

Searchlight Cyber adds AI-powered language translation to simplify dark web investigations

Searchlight Cyber has added AI-powered language translation into its dark web investigation and monitoring products DarkIQ and Cerberus. This enhancement…

Russian hackers breached Microsoft, HPE corporate maliboxes
25
Jan
2024

Russian hackers breached Microsoft, HPE corporate maliboxes

Cozy Bear (aka Midnight Blizzard, aka APT29) has been busy hacking and spying on big tech companies: both Microsoft and…