Loading...

Follow Help Net Security on Feedspot

Continue with Google
Continue with Facebook
or

Valid

Kanye West is the worst password offender of 2018, according to Dashlane. When visiting the White House, the famous rapper was sprotted unlocking his iPhone with the passcode “000000”. The Pentagon made second place: an audit by the Government Accountability Office revealed easy-to-guess admin passwords and default passwords for multiple weapons systems. Other offenders on the list include: Italian company Ferrero, who offered spectacularly bad password advice to users (they suggested the use of “Nutella” … More →

The post Worst password offenders of 2018 exposed appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

This article is the second in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of the central role that authenticity plays in the establishment of deception as a practical defense and cyber risk reduction measure. Requirements for authenticity in deception The over-arching goal for any cyber deception system is to create target computing and networking systems and infrastructure that … More →

The post Deception technology: Authenticity and why it matters appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A look back through a volatile 2018 has seen the cyber security landscape move towards an even more complex picture. This has been driven by the increased volume and diversity of threats and breaches, tools and network evolution. Security professionals have faced significant challenges in attack detection and mitigation, operating to the necessary policy and legal guidelines and growing teams with suitably-skilled personnel. None of these advances show any signs of slowing in 2019. However, … More →

The post Can advancing cybersecurity techniques keep pace with new attack vectors in 2019? appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

As engineering teams try to innovate at a faster pace, being able to maintain the quality, performance and security of the applications become much more important. Organizations have found huge success in improving their overall product quality while ensuring security controls and compliance requirements are met. AI-driven automation solutions have aided engineering teams in automating key processes and leverage predictive analytics, to identify issues before they occur and taking corrective actions, improving the overall product … More →

The post Leveraging AI and automation for successful DevSecOps appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

According to the EU’s net neutrality regulation, called the Open Internet Regulation, which came into force in 2016, internet providers should treat all internet traffic to and from their customers equally. Security measures, like blocking traffic on certain ports, are only allowed under specific circumstances. One of these circumstances refers to the application of security measures that are necessary to protect the integrity or security of networks, services using the networks, or end-user equipment. The … More →

The post Guidelines for assessing ISPs’ security measures in the context of net neutrality appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Comodo Cybersecurity released its Global Threat Report 2018 Q3, offering insights from Comodo Threat Research Lab experts into key cyberthreat trends and the impact of malware on elections and other geopolitical events. Hacking democracy and malware in conflict zones The Comodo Q3 report also reveals disturbing upticks in malware deployment leading up to major national elections. Comodo Cybersecurity researchers document the impact of malware on elections in Russia, Turkey, Mali, Sierra Leone, Azerbaijan and Columbia. … More →

The post Hacking democracy efforts continue with upticks in malware deployments appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Pivot3 revealed new policy-based security management capabilities in its Intelligence Engine. These expanded capabilities allow organizations to automate and simplify the process of protecting sensitive data with security for encryption and key management. Pivot3’s new platform enhancements also facilitate regulatory compliance as customers acquire and manage data across the edge, core and cloud. “With security threats on the rise and regulations around data security increasing, CIOs and CISOs face new challenges as they seek to … More →

The post Pivot3 delivers policy-based security for hybrid cloud solutions appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Sysdig released new features for Sysdig Secure, part of the Sysdig Cloud-Native Intelligence Platform. The Sysdig platform is the unified platform that provides cloud-native security, monitoring, and forensics. These enhancements add Kubernetes auditing and vulnerability management, service-based access control, and security analytics, along with simplified compliance to give users a view of the health and risk profiles of their container environments. With the introduction of Sysdig Secure 2.2, Sysdig continues to provide enterprise customers, like … More →

The post Sysdig introduces new capabilities to secure Kubernetes-based applications appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The vision of a standardized method to assess the risk management posture of third party suppliers to healthcare firms envisioned by the recently-formed Provider Third Party Risk Management Council is gaining momentum and support throughout the industry as security leaders from both healthcare providers and their suppliers embrace the unified approach. Led by governing members consisting of Chief Information Security Officers (CISOs) throughout the healthcare sector, the Council and its growing number of participants are … More →

The post CISO’s mission resonates with healthcare peers appeared first on Help Net Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

RSA Conference announced its initial line-up of keynote speakers for the 2019 Conference, which begins Monday, March 4 and runs through Friday, March 8 in San Francisco, CA. The keynote program will culminate with an entertaining close from actress, writer and producer Tina Fey. New this year, RSA Conference will have two keynote stages: West Stage keynotes will continue to feature sponsor keynotes, panels and esteemed guest speakers, and South Stage keynotes will utilize the … More →

The post RSA Conference announces initial 2019 keynote speakers appeared first on Help Net Security.

Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview