Security News

The complexities of third-party risk management
2024-05-08 03:30

In this Help Net Security video, Brad Hibbert, Chief Strategy Officer and Chief Operating Officer for Prevalent, discusses five interesting findings from a recent industry study on third-party risk management and what he thinks they mean for cybersecurity professionals and their companies' TPRM programs. Prevalent's 2024 Third-Party Risk Management Study found that 61% of companies experienced a third-party data breach or cybersecurity incident last year.

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
2024-04-29 10:54

It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more...

Severe Flaws Disclosed in Brocade SANnav SAN Management Software
2024-04-26 14:03

Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise susceptible appliances. The 18 flaws impact all...

Most people still rely on memory or pen and paper for password management
2024-04-26 05:00

These practices reveal a significant gap between recommended security practices and actual user behavior, highlighting how weak password habits and password reuse significantly heighten cybersecurity risks and identity theft. Despite 60% of users claiming they feel confident in identifying a phishing attack and 68% feeling prepared to identify and mitigate AI-enhanced cyberattacks, many respondents still resort to risky password management methods.

Management company settles for $18.4M after nuclear weapons plant staff fudged their timesheets
2024-04-24 15:00

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Code Keepers: Mastering Non-Human Identity Management
2024-04-12 11:13

Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and...

Graylog: Open-source log management
2024-04-11 04:00

Please turn on your JavaScript for this page to function normally. Graylog is an open-source solution with centralized log management capabilities.

Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity Cloud PAM Essentials
2024-04-09 05:30

As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access Management (PAM) solution can't be overstated....

How exposure management elevates cyber resilience
2024-04-09 04:43

Understanding an attacker's viewpoint is crucial for pinpointing vulnerabilities, informing security teams where to apply security measures first and what additional security controls are necessary. Without seeing how an attacker can infiltrate the organization, securing an organization becomes a hypothetical task.

Strategies for secure identity management in hybrid environments
2024-04-09 04:00

In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. Wylie also highlights strategies for combating password fatigue, integrating IAM solutions, securing operational technology, and establishing identity security policies.