Category: HelpnetSecurity

Key factors for effective security automation
27
Jul
2023

Key factors for effective security automation

Harnessing the potential of automation in cybersecurity is key to maintaining a robust defense against ever-evolving threats. Still, this approach…

UAC: Live response collection script for incident response
27
Jul
2023

UAC: Live response collection script for incident response

Unix-like Artifacts Collector (UAC) is a live response collection script for incident response that makes use of native binaries and…

Cryptojacking soars as cyberattacks increase, diversify
27
Jul
2023

Cryptojacking soars as cyberattacks increase, diversify

Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according…

SEC adopts new cybersecurity incident disclosure rules for companies
26
Jul
2023

SEC adopts new cybersecurity incident disclosure rules for companies

The Securities and Exchange Commission (SEC) today adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to…

SeeMetrics Security Performance Boards empowers CISOs to validate security programs
26
Jul
2023

SeeMetrics Security Performance Boards empowers CISOs to validate security programs

SeeMetrics launched its new Security Performance Boards. Organized by security domains, the new Security Performance Boards are a collection of…

MikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799)
26
Jul
2023

MikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799)

A privilege escalation vulnerability (CVE-2023-30799) could allow attackers to commandeer up to 900,000 MikroTik routers, says VulnCheck researcher Jacob Baines….

BreachRx Cyber RegScout helps legal and compliance professionals eliminate manual processe
26
Jul
2023

BreachRx Cyber RegScout helps legal and compliance professionals eliminate manual processe

BreachRx launched Cyber RegScout, a product purpose-built to automate cybersecurity, privacy and data protection regulatory analysis. Built on BreachRx’s platform,…

Companies encounter months-long delays in filling critical security positions
26
Jul
2023

Companies encounter months-long delays in filling critical security positions

A lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to…

Overcoming the cybersecurity talent shortage with upskilling initiatives
26
Jul
2023

Overcoming the cybersecurity talent shortage with upskilling initiatives

In this Help Net Security interview, Dr. Lindsey Polley de Lopez, Director of Cyber & Space Intelligence at MACH37, proposes…

Enterprises should layer-up security to avoid legal repercussions
26
Jul
2023

Enterprises should layer-up security to avoid legal repercussions

The role of CISO these days requires a strong moral compass: You have to be the one speaking up for…

Product showcase: Stellar Toolkit for Exchange - Restore Exchange Database
26
Jul
2023

Product showcase: Stellar Toolkit for Exchange – Restore Exchange Database

Time is of the essence when it comes to recovery after Exchange Server failure or database corruption, as organizations depend…

Zero trust rated as highly effective by businesses worldwide
26
Jul
2023

Zero trust rated as highly effective by businesses worldwide

Zero trust is here to stay, with 82% of experts currently working on implementing zero trust, and 16% planning to…