Category: HelpnetSecurity

Photos: IRISSCON 2023 - Help Net Security
16
Nov
2023

Photos: IRISSCON 2023 – Help Net Security

IRISSCON, the annual cybercrime-themed conference organized by the Irish Reporting and Information Security Service (IRISS), was held in Dublin, Ireland,…

From PKI to PQC: Devising a strategy for the transition
16
Nov
2023

From PKI to PQC: Devising a strategy for the transition

Quantum computers capable of breaking currently used encryption algorithms are an inevitability. And since the US, China and Europe are…

Telemetry gaps leave networks vulnerable as attackers move faster
16
Nov
2023

Telemetry gaps leave networks vulnerable as attackers move faster

Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases,…

Review: Cyberbunker: The Criminal Underworld
16
Nov
2023

Review: Cyberbunker: The Criminal Underworld

Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that…

AI helps leaders optimize costs and mitigate risks
16
Nov
2023

AI helps leaders optimize costs and mitigate risks

AI is dominating the mindshare of IT leaders this year and next, as 72% believe their organization will be using…

The new imperative in API security strategy
16
Nov
2023

The new imperative in API security strategy

Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational…

Devo Collective Defense empowers security teams with community-driven threat intelligence
15
Nov
2023

Devo Collective Defense empowers security teams with community-driven threat intelligence

Devo Technology has launched Devo Collective Defense, a threat intelligence feed within the Devo Security Data Platform that provides community-based…

Keysight Elastic Network Generator facilitates collaborative and flexible network continuous validation
15
Nov
2023

Keysight Elastic Network Generator facilitates collaborative and flexible network continuous validation

Keysight Technologies has introduced a first in its class advancement in network testing with the new Keysight Elastic Network Generator…

ThreatModeler 7.0 brings AI to threat modeling
15
Nov
2023

ThreatModeler 7.0 brings AI to threat modeling

ThreatModeler released ThreatModeler, Version 7.0, bringing several new capabilities, including ThreatModeler WingMan (AI assistant), to help streamline the threat modeling…

Resecurity enhances cybersecurity in the Middle East
15
Nov
2023

Resecurity enhances cybersecurity in the Middle East

In a significant stride towards fortifying the cybersecurity landscape in the Middle East, Resecurity introduced its Digital Identity Protection (IDP)…

HARmor: Open-source tool for sanitizing and securing HAR files
15
Nov
2023

HARmor: Open-source tool for sanitizing and securing HAR files

HARmor is an open-source tool that sanitizes HTTP Archive files. Easy to install and run, it enables the safe handling…

Crypto asset discovery and the post-quantum migration
15
Nov
2023

Crypto asset discovery and the post-quantum migration

Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google…