Category: HelpnetSecurity

Crypto asset discovery and the post-quantum migration
15
Nov
2023

Crypto asset discovery and the post-quantum migration

Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google…

Modeling organizations' defensive mechanisms with MITRE D3FEND
15
Nov
2023

Modeling organizations’ defensive mechanisms with MITRE D3FEND

Funded by the National Security Agency, MITRE’s D3FEND framework is helping to provide standardization, specificity, and repeatability needed by cybersecurity…

Generative AI is shaping future incident management processes
15
Nov
2023

Generative AI is shaping future incident management processes

Persistent challenges in adhering to established incident management processes pose a significant risk to organizations, amplifying potential downtime costs amidst…

Organizations should prepare for the inevitability of cyberattacks on their infrastructure
15
Nov
2023

Organizations should prepare for the inevitability of cyberattacks on their infrastructure

Organizations reliance on technology has contributed to the fact that their attack surface has grown in size and complexity, according…

Product showcase: Nudge Security’s SaaS security and governance platform
15
Nov
2023

Product showcase: Nudge Security’s SaaS security and governance platform

In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and…

Lacework unifies code and cloud security
14
Nov
2023

Lacework unifies code and cloud security

Lacework announced its release of code security, which provides Lacework customers full visibility throughout the complete application development lifecycle. Lacework…

Juniper networking devices under attack
14
Nov
2023

Juniper networking devices under attack

CISA has ordered US federal agencies to patch five vulnerabilities used by attackers to compromise Juniper networking devices, and to…

4 warning signs that your low-code development needs DevSecOps
14
Nov
2023

4 warning signs that your low-code development needs DevSecOps

Low code platforms have democratized development in the enterprise. They improve efficiency and enable companies to do more with less….

10 corporate cybersecurity blogs worth your time
14
Nov
2023

10 corporate cybersecurity blogs worth your time

In this article, we’ve curated a list of insightful corporate cybersecurity blogs that provide analysis and actionable advice to help…

Collaborative strategies are key to enhanced ICS security
14
Nov
2023

Collaborative strategies are key to enhanced ICS security

In this Help Net Security interview, Marko Gulan, Cyber Security Consultant at Schneider Electric, discusses the complexities of safeguarding industrial…

k0smotron: Open-source Kubernetes cluster management
14
Nov
2023

k0smotron: Open-source Kubernetes cluster management

Open-source solution k0smotron is enterprise-ready for production-grade Kubernetes cluster management with two support options. Kubernetes cluster management Management and worker…

The cloud skills gap is digital transformation's Achilles' heel
14
Nov
2023

The cloud skills gap is digital transformation’s Achilles’ heel

98% of organizations globally are facing a cloud skills gap, specifically in trying to find people with general cloud skills,…