NetWitness delivers visibility into a vast array of network assets with the 12.3 update

NetWitness launches 12.3 update of its NetWitness Intelligent Threat Detection and Response Platform. The latest update offers enterprises more visibility into cyber threats than ever before with passive discovery,... Read more »

Cybeats collaborates with CodeSecure to prevent software supply chain attacks

Cybeats and CodeSecure announced a technology partnership to help customers proactively monitor and remediate software supply chain security threats. According to industry sources, reused code is prevalent in virtually... Read more »

Researchers warn of increased malware delivery via fake browser updates

ClearFake, a recently documented threat leveraging compromised WordPress sites to push malicious fake browser updates, is likely operated by the threat group behind the SocGholish “malware delivery via fake... Read more »

How to go from collecting risk data to actually reducing risk?

Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move beyond finding risks to effectively mitigating risk. Making that... Read more »

The collaborative power of CISOs, CTOs and CIOs for a secure future

In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report on board collaboration with the C-suite — particularly the... Read more »

One in five CISOs miss out on pay raise

The CISO role was partially shielded from the macroeconomic challenges of 2023, according to a new research from IANS and Artico Search. 20% of CISOs did not receive a... Read more »

Cyberattacks on healthcare organizations affect patient care

88% of organizations experienced an average of 40 attacks in the past 12 months, according to a survey conducted by the Proofpoint and Ponemon Institute. Supply chain attacks: Leading... Read more »

Anticipating the benefits of a passwordless tomorrow

Businesses are actively moving to eradicate passwords from employees’ lives, with 89% of IT leaders expecting passwords to represent less than a quarter of their organization’s logins within five... Read more »

Essential cyber hygiene: Making cyber defense cost effective

Strengthening your cyber defenses can be a daunting task. Where do you start? Which tools do you use? How much will it cost? And, what do you risk losing... Read more »

ELITEWOLF: NSA’s repository of signatures and analytics to secure OT

Cyber entities continue to show a persistent interest in targeting critical infrastructure by taking advantage of vulnerable OT assets. To counter this threat, NSA has released a repository for... Read more »
Subscribe to our Newsletter