June 2024

Crown Equipment cyberattack confirmed, manufacturing disrupted for weeks
Ohio-based Crown Equipment, which is among the largest industrial and forklift truck manufacturers in the world, has become a victim of a cyberattack “by an …

Concentric AI’s compliance feature helps organizations identify and address compliance risks
Concentric AI announced it has incorporated new industry compliance capabilities into its Semantic Intelligence DSPM solution. With these new innovative features, Concentric …

CDK Global cyberattack cripples 15,000 US auto dealerships
CDK Global, a software-as-a-service (SaaS) provider for car dealers and auto equipment manufacturers, has suffered a cyberattack that has temporarily disrupted its …

Verimatrix XTD dashboard enhancements improve mobile app security
Verimatrix announced major enhancements to its XTD dashboard, providing customers with better visibility into application security risks and more actionable insights to better …

From passwords to passkeys: Enhancing security and user satisfaction
In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and …

Improving OT cybersecurity remains a work in progress
Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network …

Most cybersecurity pros took time off due to mental health issues
Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing …

eBook: CISO guide to password security
Password security has seen dramatic shifts driven by the escalation of cyber threats and technological advancements. This eBook covers: Best practices for NIST-compliant …

Pure Storage enhances its platform with cyber resiliency services and capabilities
Pure Storage announced three new Storage as-a-Service (STaaS) service-level agreements (SLAs) for the Pure Storage platform – cyber recovery and resilience and site …

Clever macOS malware delivery campaign targets cryptocurrency users
Cryptocurrency users are being targeted with legitimate-looking but fake apps that deliver information-stealing malware instead, Recorded Future’s researchers are …

Quantum Xchange expands Phio TX platform to offer secure site-to-site and remote access VPN
Quantum Xchange launched version 4.0 of its quantum-safe key delivery platform Phio TX, featuring Phio VPN, a Virtual Private Network (VPN) to combine AI-native networking …

How can SLTTs defend against cyber threats?
Managing cybersecurity for any organization is no easy feat. Improving cybersecurity maturity is often even more difficult, made increasingly challenging by the eye-watering …