NetSecurity ThreatResponder Platform protects corporate assets against cyber attacks

NetSecurity released its latest version of ThreatResponder Platform to predict and protect enterprise networks against advanced cyber attacks, data breaches, and insider threats. NetSecurity’s ThreatResponder Platform is an all-in-one... Read more »

The rise and continuing popularity of LinkedIn-themed phishing

Phishing emails impersonating LinkedIn continue to make the bulk of all brand phishing attempts; according to Check Point, 45% of all email phishing attempts in Q2 2022 imitated the... Read more »

Atlassian fixes critical flaws in Confluence, Jira, Bitbucket and other products, update quickly!

Atlassian has fixed three critical vulnerabilities and is urging customers using Confluence, Bamboo, Bitbucket, Crowd, Fisheye and Crucible, Jira and Jira Service Management to update their instances as soon... Read more »

Companies around the globe still not implementing MFA

SMB owners across the globe are still relying only on usernames and passwords to secure critical employee, customer, and partner data, according to the Global Small Business Multi-Factor Authentication... Read more »

CloudMensis backdoor spies on users of compromised Macs

ESET researchers discovered CloudMensis, a macOS backdoor that spies on users of compromised Macs and uses public cloud storage services to communicate back and forth with its operators. The... Read more »

AppViewX raises $20 million to help businesses reduce risk

AppViewX has raised $20 million in a Series B funding round, led by growth equity firm and existing investor, Brighton Park Capital. Through its Automation Platform, AppViewX reduces risk... Read more »

How organizations can implement a complete data strategy

In this Help Net Security video, Bernard Brantley, CISO at Corelight, discusses why organizations need to rethink their data strategy, challenging the assumption that they must collect everything and... Read more »

The importance of secure passwords can’t be emphasized enough

Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the importance of strong passwords as... Read more »

Introducing the book: Managing the Dynamic Nature of Cyber Security

In order to provide organizations with knowledge to lower their cyber risk, Dr. Sander Zeijlemaker, launched his book – “Managing the Dynamic Nature of Cyber Security: A future-proof strategy,... Read more »

60% of IT leaders are not confident about their secure cloud access

60% of IT and security leaders are not confident in their organization’s ability to ensure secure cloud access, even as adoption continues to grow across a diverse range of... Read more »
Subscribe to our Newsletter