October 2023

BackBox Network Vulnerability Manager identifies vulnerabilities and classifies them by threat level
BackBox launched Network Vulnerability Manager (NVM). With this new capability added to its existing Network Automation Platform, BackBox integrates automated OS upgrades and …

Verint PII Redaction Bot protects sensitive data
Verint launched the Verint Personal Identifiable Information (PII) Redaction Bot giving organizations a way to automate compliance, reduce risk, and protect their customers’ …

Valve introduces SMS-based confirmation to prevent malicious games on Steam
Video game publisher/digital distribution company Valve is forcing developers who publish games on its Steam platform to “validate” new builds with a confirmation …

Whistic Smart Response eliminates the manual steps of security assessment questionnaires
Whistic launched AI-powered Smart Response capability within their dual-sided TPRM platform. With an eye toward entirely eliminating the manual steps of security assessment …

ManageEngine strengthens endpoint security with next generation antivirus capability
ManageEngine adds next-generation antivirus capability to its UEM, Endpoint Central, positioning it as an endpoint protection platform. In today’s cyber environment, …

NetWitness delivers visibility into a vast array of network assets with the 12.3 update
NetWitness launches 12.3 update of its NetWitness Intelligent Threat Detection and Response Platform. The latest update offers enterprises more visibility into cyber threats …

Cybeats collaborates with CodeSecure to prevent software supply chain attacks
Cybeats and CodeSecure announced a technology partnership to help customers proactively monitor and remediate software supply chain security threats. According to industry …

Researchers warn of increased malware delivery via fake browser updates
ClearFake, a recently documented threat leveraging compromised WordPress sites to push malicious fake browser updates, is likely operated by the threat group behind the …

How to go from collecting risk data to actually reducing risk?
Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move beyond finding risks to effectively …

The collaborative power of CISOs, CTOs and CIOs for a secure future
In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report on board collaboration with the C-suite — …

One in five CISOs miss out on pay raise
The CISO role was partially shielded from the macroeconomic challenges of 2023, according to a new research from IANS and Artico Search. 20% of CISOs did not receive a raise …

Cyberattacks on healthcare organizations affect patient care
88% of organizations experienced an average of 40 attacks in the past 12 months, according to a survey conducted by the Proofpoint and Ponemon Institute. Supply chain attacks: …