Search results for: software


Elevate Security partners with Booz Allen Hamilton to combat advanced cybersecurity attacks

Elevate Security and Booz Allen Hamilton announced a strategic partnership that aligns Booz Allen’s cybersecurity consulting services with Elevate’s human cyber risk quantification and mitigation software to address the human element of cybersecurity risk. Booz Allen’s Commercial team will leverage Elevate’s vast cyber risk intelligence capabilities to deliver rapid risk assessments and provide deep visibility to organization-wide internal cyber risk. Additionally, Elevate will power the Booz Allen Commercial team’s Dynamic Cyber Trust solution, which adapts … More


Cybrary and Carahsoft join forces to provide cybersecurity training for government customers

Cybrary announced a partnership with Carahsoft Technology Corp to provide cybersecurity skill development to government agencies and customers. Under the agreement, Carahsoft will serve as Cybrary’s Public Sector distributor, making the company’s cybersecurity training and skills development platform available to the Public Sector through Carahsoft’s reseller partners, NASA Solutions for Enterprise-Wide Procurement (SEWP) V, Information Technology Enterprise Solutions – Software 2 (ITES-SW2), OMNIA Partners, National Association of State Procurement Officials (NASPO), ValuePoint, and National Cooperative … More


HashiCorp appoints David Henshall to Board of Directors

Most recently David Henshall held the role of chief executive officer at Citrix Systems. During his nearly two decades with the company he also held roles as chief operating officer and chief financial officer, overseeing the company’s worldwide finance, operations, and administration organizations. “I’m thrilled to welcome David to HashiCorp’s board of directors. I believe he’ll bring a great deal of value to HashiCorp given his extensive experience scaling a software company to billions of … More


Multi-platform Chaos malware threatens to live up to its name

Chaos, new multipurpose malware written in the Go programming language, is spreading across the world. “We are seeing a complex malware that has quadrupled in size in just two months, and it is well-positioned to continue accelerating,” said Mark Dehus, director of threat intelligence at Lumen‘s Black Lotus Labs. Versatile and potent Chaos is designed to work across several architectures, including ARM, Intel (i386), MIPS and PowerPC. It was developed for Windows, Linux, and a … More

Active Directory

3 types of attack paths in Microsoft Active Directory environments

A common question we are asked by clients after deploying is, “Are attack paths in Active Directory this bad for everyone?” The answer is usually “Yes,” which doesn’t make them feel better. However, what does often cheer them up is learning that many of those attack paths can be fixed quickly and easily, now that the security team knows they exist. Attack path types From the perspective of a defender, there are three types of … More

Wolfi Linux

Wolfi Linux provides the control needed to fix modern supply chain threats

There’s been a massive push for supply chain security in the last few years: integrity protection, vulnerability management, and transparency. This push has left organizations struggling to secure their pipelines and manage vulnerabilities, especially when running in the cloud. Existing tooling doesn’t support supply chain security natively and requires users to bolt on critical features like signatures, provenance, and software bills of material (SBOM). In this Help Net Security video, Dan Lorenc, CEO at Chainguard, … More

remote workforce protection

Businesses find remote work security risks less daunting than before

After two years of the pandemic, confidence in addressing certain security risks and threats arising from hybrid and remote work has improved among businesses and organizations around the world. When it comes to secure access to applications, data, and systems, 84% of IT professionals this year said they have some degree of confidence in their current user access security systems to enable remote work securely and easily, compared to 56% in 2021, according to a … More

Video lock

Cloudflare announces Zero Trust SIM to help organizations secure mobile employee devices

Cloudflare announced the development of the Cloudflare Zero Trust SIM, a solution that secures every packet of data leaving mobile devices. With the Zero Trust SIM that Cloudflare is developing, organizations will be able to quickly and securely connect employee devices to Cloudflare’s global network, directly integrate devices with Cloudflare’s Zero Trust platform, and protect their network and employees no matter where they are working from. Additionally, Cloudflare will be launching Zero Trust for Mobile … More

security platform

CertifID launches PayoffProtect to authenticate loan payoff wiring

CertifID has launched PayoffProtect, which gives title, escrow and settlement companies peace of mind by preventing property loan payoffs from being sent to fraudsters. This launch comes on the heels of its recent $12.5 million Series A funding by Arthur Ventures, known for leading investments in business-to-business software companies. The new PayoffProtect solution combines CertifID’s expert knowledge and suite of intellectual property. The latter includes machine learning capabilities that are now being leveraged to automate … More

security platform

Fortinet introduces new and enhanced AIOps capabilities across its entire networking portfolio

Fortinet announced enhanced AIOps capabilities across its entire networking portfolio, including the artificial intelligence-based network operations management for 5G/LTE gateways. When combined with the latest AIOps enhancements to Fortinet’s Secure SD-WAN and Wired/Wireless LAN portfolio, network operations teams have access to even more dynamic insights and event correlation across their entire network, making FortiAIOps the most complete AIOps network management platform in the industry. Growing urgency for AI-enhanced network automation With accelerated digital innovation and … More


Fortress Information Security collaborates with ONG-ISAC to improve supply chain cybersecurity

Fortress Information Security and the Oil and Natural Gas Information Sharing Analysis Center (ONG-ISAC) announced an industry-wide initiative focused on securing hardware and software components and supply chains. The software and hardware used by oil and natural gas systems are critical to the industry’s reliable and safe operation. In addition, the supply chains for these products are at increased risk of compromise. Fortress will enable ONG-ISAC members to manage these risks securely and cost-effectively. For … More


Jamf to acquire ZecOps to strengthen mobile security posture for organizations

Jamf announced it signed a definitive agreement to acquire ZecOps. This acquisition uniquely positions Jamf to help IT and security teams strengthen their organization’s mobile security posture, accelerating mobile security investigations from weeks to minutes, leverage known indicators of compromise (IOC) at-scale, and identify sophisticated 0 or 1 click attacks on a much deeper scale. “I am very excited to bring ZecOps’ market-leading advanced mobile detection and response capabilities into the Jamf platform,” said Dean … More