Infosec products of the month: May 2024

The Third-Party Intelligence module combines vendor-specific cyber threat intelligence with cybersecurity posture data from suppliers' tech environments, exposing a critical blind spot for security teams.
Synopsys Polaris Assist automates repetitive, time-consuming tasks for security and development teams.
Polaris Assist combines Large Language Model technology with Synopsys' application security knowledge and intelligence - including coding patterns, vulnerability detection rules, and Black Duck's vast open source knowledge base - to provide security and development teams with easy-to-understand summaries of detected vulnerabilities, AI-generated code fix recommendations, and other insights to help them build more secure software faster.
Secure Code Warrior SCW Trust Score quantifies the security posture of developer teams.
Secure Code Warrior unveiled SCW Trust Score, a benchmark that quantifies the security posture of organizations' developer teams.
SCW Trust Score provides a vital baseline of the impact of their learning programs, assesses its effectiveness, and enables security, developer and engineering teams to more effectively collaborate and recalibrate skills training.
Splunk announced Splunk Asset and Risk Intelligence, a solution designed to power the SOC of the future by helping businesses streamline compliance, reduce cyber risk and eliminate the sources of shadow IT. It allows security operations teams to map relationships between assets and identities to expedite investigations, enabling rich asset and identity context for faster security incident response.
With Singularity Cloud Native Security, SentinelOne provides a comprehensive CNAPP that blocks attacks, combining its Cloud Native Security with AI-powered Cloud Workload Security and Cloud Data Security threat protection products to deliver visibility and mitigation capabilities in a single cloud security platform.
Sumo Logic's analytics capabilities allow security teams to find insights within their data.
Sumo Logic announced new AI and security analytics capabilities that allow security and development teams to align around a single source of truth and collect and act on data insights more quickly.
These advancements empower customers to use their critical security data to close security gaps and better fuel DevSecOps.
Cranium AI Exposure Management empowers organizations to identify vulnerabilities in AI infrastructure, ensuring the security and reliability of machine learning applications and supercharge red-teaming efforts to discover novel threats, inform protection strategies, and harden AI systems against known adversarial tactics and vulnerabilities to help secure AI/LLM development and usage.
Forcepoint ONE Data Security simplifies data protection with zero-trust principles for all organizations.
The new Forcepoint SaaS solution provides unified management for endpoint and multi-channel cloud data security, eliminating the need for multiple tools and complex policy management.
Forcepoint offers a single place to manage data security policy for global compliance and proactive breach prevention across all digital channels.
OWASP dep-scan: Open-source security and risk audit tool.
OWASP dep-scan is an open-source security and risk assessment tool that leverages information on vulnerabilities, advisories, and licensing restrictions for project dependencies.
PlexTrac Plex AI helps offensive security teams write reports.
Plex AI applies PlexTrac's algorithms to scale findings development and authoring, saving countless hours in manual proactive security report development while ensuring the quality and data integrity that leading MSSPs, MSPs, and enterprises demand.
Adaptive Shield has extended the capabilities of its SaaS Security Posture Management unified platform to cover complex Permissions and Shared Data.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Mon, 03 Jun 2024 03:13:05 +0000


Cyber News related to Infosec products of the month: May 2024

AuditBoard enhances InfoSec Solutions to reduce compliance fatigue across the organization - AuditBoard announced powerful enhancements for its InfoSec Solutions to help organizations meet their IT compliance, cyber risk, and vendor risk management needs in the face of rising risks and increased regulatory requirements. With these new ...
6 months ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
Infosec pros sound off on usefulness of higher education The Register - Half of infosec professionals polled by Kaspersky said any cybersecurity knowledge they picked up from their higher education is at best somewhat useful for doing their day jobs. On the other hand, half said the know-how was at least very useful. The ...
9 months ago Go.theregister.com
Infosec pros sound off on usefulness of higher education The Register - Half of infosec professionals polled by Kaspersky said any cybersecurity knowledge they picked up from their higher education is at best somewhat useful for doing their day jobs. On the other hand, half said the know-how was at least very useful. The ...
9 months ago Theregister.com
Netskope Report Surfaces Raft of Cybersecurity Challenges - A report published by Netskope today revealed that, on average, 29 out of every 10,000 enterprise users clicked on a phishing link each month in 2023. Based on anonymized usage data collected by the Netskope Security Cloud platform, the report also ...
10 months ago Securityboulevard.com
What is Certified information Security Manager? Definition from SearchSecurity - Certified Information Security Manager is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security program. CISM is offered by ISACA, a ...
8 months ago Techtarget.com
ISB Cybersecurity Awareness Month: Expert Tips - Information Security Buzz spoke with several security experts and asked them, “What’s the one piece of advice that could make a difference?” Their responses highlight that cybersecurity is not one-size-fits-all—each organization must tailor ...
2 months ago Informationsecuritybuzz.com
Ransomware Attacks in November Rise 67% From 2022 - Global levels of ransomware attacks rose 30% in November, with a total of 442 attacks, following a lower volume of attacks in October according to NCC Group's November Threat Pulse. As the third most active month of the year, ransomware levels in ...
11 months ago Darkreading.com
Ransomware review: December 2023 - This provides the best overall picture of ransomware activity, but the true number of attacks is far higher. In November there were 457 total ransomware victims, making it the most active month for ransomware gangs in 2023 so far besides May. The top ...
11 months ago Malwarebytes.com
Wait, infosec isn't a computer science degree requirement? The Register - Comment There's a line in the latest plea from CISA - the US government's cybersecurity agency - to software developers to do a better job of writing secure code that may make you spit out your coffee. Jack Cable, a CISA senior technical advisor, ...
10 months ago Go.theregister.com
Wait, infosec isn't a computer science degree requirement? The Register - Comment There's a line in the latest plea from CISA - the US government's cybersecurity agency - to software developers to do a better job of writing secure code that may make you spit out your coffee. Jack Cable, a CISA senior technical advisor, ...
10 months ago Theregister.com
Vulnerability Summary for the Week of January 15, 2024 - This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and 3.8.13 This vulnerability was reported via the GitHub Bug Bounty program. Successful attacks require human interaction from a ...
10 months ago Cisa.gov
Join us at InfoSec Jupyterthon 2024 - Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center tools. Notebooks can be used interactively for threat detection and response, or as automated ...
10 months ago Microsoft.com
Social engineering in the era of generative AI: Predictions for 2024 - Breakthroughs in large language models are driving an arms race between cybersecurity and social engineering scammers. For businesses, generative AI is both a curse and an opportunity. It's not just AI models themselves that cyber criminals are ...
6 months ago Securityintelligence.com
December 2023 Patch Tuesday forecast: 'Tis the season for vigilance - Many in the retail industry have placed our systems in 'lockdown' since before Thanksgiving to ensure we don't interrupt ongoing sales. They won't be able to update them until after the holidays, but that doesn't mean they can't respond to threats. ...
11 months ago Helpnetsecurity.com
Ransomware review: January 2024 - This provides the best overall picture of ransomware activity, but the true number of attacks is far higher. In February, there were 376 ransomware victims, marking an unusually active month for the historically subdued time period. February didn't ...
8 months ago Malwarebytes.com
Cybercrime Groups Offering Six-Figure Salaries for IT Talents - Increasingly, organized crime organizations are operating as businesses rather than criminal organizations, advertising jobs on the dark web with a number of advantages for members. A recent Kaspersky study found that 61% of job ads posted by hacking ...
1 year ago Cybersecuritynews.com
Celebrating Latin and Hispanic Heritage Month - Cisco Blogs - While LHHM gives us a special opportunity to celebrate our culture, WE should continually uplift our community, honor our traditions, and show respect for other cultures, ensuring that the values of unity and diversity remain at the forefront of our ...
2 months ago Feedpress.me
AWS LetsEncrypt Lambda: Custom TLS Provider - DZone - Trying to renew ... INFO[0000] Checking certificate for domain 'hackernoon.referrs.me' with arn 'arn:aws:acm:us-east-2:004867756392:certificate/72f872fd-e577-43f4-ae38-6833962630af' INFO[0000] Certificate status is 'ISSUED' INFO[0000] Certificate in ...
2 months ago Feeds.dzone.com
Week in review: Google fixes yet another Chrome zero-day exploit, YouTube as a cybercrime channel - Google fixes yet another Chrome zero-day exploited in the wildFor the eighth time this year, Google has released an emergency update for its Chrome browser that fixes a zero-day vulnerability with an in-the-wild exploit. Authelia: Open-source ...
6 months ago Helpnetsecurity.com
Another Patch Tuesday with no zero-days, only two critical vulnerabilities disclosed by Microsoft - For the second month in 2024, there are no actively exploited vulnerabilities included in this month's security update from Microsoft. Still, both critical vulnerabilities addressed this month are notable because they affect Windows Hyper-V, ...
8 months ago Blog.talosintelligence.com
How to Enrich Data for Fraud Reduction, Risk Management and Mitigation in BFSI - To stay ahead of these challenges, organizations are increasingly relying on data products to enrich their data and enhance their fraud reduction and risk management strategies. The Data Revolution in BFSI. Data is the lifeblood of the BFSI sector. ...
9 months ago Securityboulevard.com
Infosec products of the month: September 2024 - Help Net Security - Tenable AI Aware leverages agents, passive network monitoring, dynamic application security testing and distributed scan engines to detect approved and unapproved AI software, libraries and browser plugins, along with associated vulnerabilities, ...
2 months ago Helpnetsecurity.com
Cisco intros AI to find firewall flaws, but it'll cost you The Register - Cisco's executive veep for security Jeetu Patel has predicted that AI will change the infosec landscape, but that end users will eventually pay for the privilege of having a binary brainbox by their side when they go into battle. Speaking at the Asia ...
11 months ago Go.theregister.com
Vulnerability Summary for the Week of February 12, 2024 - Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise ...
9 months ago Cisa.gov

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)