Zero trust implementation: Plan, then execute, one step at a time

82% of cybersecurity professionals have been working on implementing zero trust last year, and 16% should be on it by the end of this year. The challenges of zero... Read more »

Custom rules in security tools can be a game changer for vulnerability detection

In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline security scanning. Stressing the need to avoid slowing down... Read more »

CVEMap: Open-source tool to query, browse and search CVEs

CVEMap is an open-source command-line interface (CLI) tool that allows you to explore Common Vulnerabilities and Exposures (CVEs). It’s designed to offer a streamlined and user-friendly interface for navigating... Read more »

Unpacking the challenges of AI cybersecurity

As organizations handle increasing amounts of data daily, AI offers advanced capabilities that would be harder to achieve with traditional methods. In this Help Net Security video, Tyler Young,... Read more »

Payment fraud is hitting organizations harder than ever before

96% of US companies were targeted with at least one fraud attempt in the past year, according to Trustpair. 83% of US companies saw an increase in cyber fraud... Read more »

Infosec products of the month: January 2024

Here’s a look at the most interesting products from the past month, featuring releases from: 1Kosmos, Atakama, Critical Start, Dasera, ID R&D, Living Security, Onfido, Regula, Searchlight Cyber, Seceon,... Read more »

Experian Fraud Protect enables automotive dealers to detect and prevent fraud

With more of the vehicle buying journey shifting online and vehicle prices remaining at elevated levels, fraudsters are targeting the automotive industry at an increasing rate. To address the... Read more »

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions of Windows and Windows Server could spell trouble for... Read more »

Vade uses generative AI to enhance spear-phishing detection

Vade announced that it has pioneered a new method that improves the confidence of its spear-phishing detection engine. The enhancement, designed to combat advanced threats including those produced by... Read more »

Kentik AI improves network monitoring and observability

Kentik launched Kentik AI to give any engineer, operator, architect, or developer the ability to troubleshoot complex networks. The company is simultaneously launching a modern and AI-assisted Network Monitoring... Read more »
Subscribe to our Newsletter