Please turn on your JavaScript for this page to function normally.
New infosec products of the week: December 16, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Box, Ermetic, Keysight Technologies, Searchlight Security, and WatchGuard. …

shield
Ensuring trust for high-value digital transactions

With the holiday season upon us, auto dealerships are facing an influx of consumers looking to swoop on end-of-year sales and holiday offers. While previous years saw a steady …

vulnerability
Lack of key domain security measures leaves organizations at risk

In this Help Net Security video, Ihab Shraim, CTO at CSC, talks about how 75% of the Forbes Global 2000 are exposing themselves to significant enterprise risks as third …

risk
Executives take more cybersecurity risks than office workers

Ivanti worked with cybersecurity experts and surveyed 6,500 executive leaders, cybersecurity professionals, and office workers to understand the perception of today’s …

network
Will 2023 be another year of chaos and instability?

A defining characteristic of 2022 has been the way that online campaigns driven by real-world events have amassed unexpected energy, fueling hacktivism and inviting in global …

IronCore Labs
Product showcase: Searchable encryption in Elasticsearch and OpenSearch with IronCore Labs

When it comes to sensitive data, search services are the ultimate treasure trove for hackers. Why slowly sift through information when a search service has indexed it all for …

security culture
5 tips for building a culture of cybersecurity accountability

In this Help Net Security video, Corey Nachreiner, CSO at WatchGuard, talks about how effective cybersecurity often boils down to doing the basics: patching, updating, and …

sad
Distractions at work can have serious cybersecurity implications

Distracted employees are twice as likely to do the bare minimum for security at work, according to 1Password. The findings reveal that sustained burnout, now paired with high …

payments
As legislation evolves, businesses need a firm understanding of secure payment options

Despite the constant evolution of the financial landscape, consumers are still prioritizing a seamless and safe payment journey above all else, according to PCI Pal. New …

insider threat
3 major threat detection methods explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by …

gap
How companies can avoid costly data breaches

IBM found that it takes on average 277 days to discover a security breach and costs businesses an average of $4.35 million per breach. Moreover, the time-to-discovery can …

open source
Nosey Parker: Find sensitive information in textual data and Git history

Praetorian has open-sourced the regular expression-based (RegEx) scanning capabilities of its Nosey Parker secret scanning tool. Scanning filesystem content for secrets …

Don't miss

Cybersecurity news