Category: HelpnetSecurity

Check Point Quantum SASE protects hybrid work and cloud networks
12
Oct
2023

Check Point Quantum SASE protects hybrid work and cloud networks

Check Point launched Quantum SASE, integrating technologies from newly acquired Perimeter 81. This integrated offering addresses organizations’ needs for a…

Microsoft Defender can automatically contain compromised user accounts
12
Oct
2023

Microsoft Defender can automatically contain compromised user accounts

The “contain user” feature select Microsoft Defender for Endpoint customers have been trying out since November 2022 is now available…

As biohacking evolves, how vulnerable are we to cyber threats?
12
Oct
2023

As biohacking evolves, how vulnerable are we to cyber threats?

Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin…

Yeti: Open, distributed, threat intelligence repository
12
Oct
2023

Yeti: Open, distributed, threat intelligence repository

Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically,…

Sic Permission Slip on data brokers that use your data
12
Oct
2023

Sic Permission Slip on data brokers that use your data

Permission Slip, an iPhone and Android app developed by Consumer Reports, helps users ask companies and data brokers to stop…

Keeping up with the demands of the cyber insurance market
12
Oct
2023

Keeping up with the demands of the cyber insurance market

Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber…

Unmasking the limitations of yearly penetration tests
12
Oct
2023

Unmasking the limitations of yearly penetration tests

In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous…

Cybersecurity should be a business priority for CEOs
12
Oct
2023

Cybersecurity should be a business priority for CEOs

74% of CEOs are concerned about their organizations’ ability to avert or minimize damage to the business from a cyberattack…

Egnyte releases Document Room to streamline the sharing of large volumes of sensitive documents
11
Oct
2023

Egnyte releases Document Room to streamline the sharing of large volumes of sensitive documents

Egnyte has launched Egnyte Document Room, a new solution powered by Egnyte’s secure platform for content collaboration and governance. With…

Veza launches Next-Gen IGA to help enterprises reduce identity risks
11
Oct
2023

Veza launches Next-Gen IGA to help enterprises reduce identity risks

Veza launched its Next-Gen IGA (Identity Governance and Administration) solution. The solution comprises the Veza Access Control Platform and new…

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545)
11
Oct
2023

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545)

Curl v8.4.0 is out, and fixes – among other things – a high-severity SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545). Appropriate…

15 free Microsoft 365 security training modules worth your time
11
Oct
2023

15 free Microsoft 365 security training modules worth your time

Microsoft 365 is a cloud-based productivity suite. Beyond just tools like Word and Excel, it integrates productivity applications with cloud…