Category: HelpnetSecurity

01
Feb
2023

OTAVA releases Security as a Service to protect users against all attack vectors

OTAVA launched Security as a Service (SECaaS) for businesses that need external resources or added expertise to maintain a comprehensive…

01
Feb
2023

Trulioo identity verification platform helps businesses achieve regulatory compliance

Trulioo continues to evolve its identity verification capabilities by combining a full suite of global person and business verification solutions…

01
Feb
2023

Vulnerability in Cisco industrial appliances is a potential nightmare (CVE-2023-20076)

Cisco has released patches for a high-severity vulnerability (CVE-2023-20076) found in some of its industrial routers, gateways and enterprise wireless…

01
Feb
2023

GroupSense VIP Monitoring service enables enterprises to proactively protect executives

GroupSense’s VIP Monitoring service assesses and monitors high-profile individuals, executive identities, and their extended personal networks to detect exposure and…

01
Feb
2023

70% of CIOs anticipate their involvement in cybersecurity to increase

77% of CIOs say their role has been elevated due to the state of the economy and they expect this…

01
Feb
2023

Video walkthrough: Cybertech Tel Aviv 2023

Help Net Security is in Israel this week for Cybertech Tel Aviv 2023, talking to the key players from the…

01
Feb
2023

Photos: Cybertech Tel Aviv 2023

Cybertech Tel Aviv 2023 is under way at the Tel Aviv Expo. The conference and exhibition gathers cybersecurity experts, businesses…

01
Feb
2023

The future of vulnerability management and patch compliance

IT departments continue to face immense pressure to get vulnerability and patch management right as threat actors use new and…

01
Feb
2023

As the anti-money laundering perimeter expands, who needs to be compliant, and how?

Anti-money laundering (AML) policies are getting stronger as countries crack down on any opportunity criminals might have to take advantage…

01
Feb
2023

Mix of legacy OT and connected technologies creates security gaps

Rising threats to vehicles and industrial operational technology (OT) have led a growing number of enterprises worldwide to invest in…

01
Feb
2023

Red Hat and Oracle expand collaboration to standardize cloud operations

Red Hat and Oracle have unveiled a multi-stage alliance to offer customers a greater choice of operating systems to run…

31
Jan
2023

Attackers used malicious “verified” OAuth apps to infiltrate organizations’ O365 email accounts

Malicious third-party OAuth apps with an evident “Publisher identity verified” badge have been used by unknown attackers to target organizations…