Essential metrics for effective security program assessment

In this Help Net Security interview, Alex Spivakovsky, VP of Research & Cybersecurity at Pentera, discusses essential metrics for evaluating the success of security programs. Spivakovsky explains how automation and proactive testing can reveal vul… Continue reading Essential metrics for effective security program assessment

Half of enterprises suffer breaches despite heavy security investments

Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective strategies to … Continue reading Half of enterprises suffer breaches despite heavy security investments

51% of enterprises experienced a breach despite large security stacks

Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, according t… Continue reading 51% of enterprises experienced a breach despite large security stacks

Infosec products of the month: March 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, AuditBoard, Bedrock Security, Cado Security, Check Point, CyberArk, Cynerio, DataDome, Delinea, Drata, Exabeam, GitGuardian, GitHub, GlobalSign, Legat… Continue reading Infosec products of the month: March 2024

Pentera Cloud empowers security teams to reduce exposure to cloud-native attacks

Pentera launched Pentera Cloud as part of its automated security validation platform to complement its renowned Pentera Core and Surface products. Pentera Cloud is the software product enabling on-demand security testing and resilience assessment of co… Continue reading Pentera Cloud empowers security teams to reduce exposure to cloud-native attacks

Pentera collaborates with SpyCloud to reduce dwell time of compromised credentials

Pentera announced an integration with SpyCloud to automate the discovery and validation of compromised identities. Pentera uses exposure intelligence data to identify exploitable identities and facilitates targeted remediation to proactively reduce ris… Continue reading Pentera collaborates with SpyCloud to reduce dwell time of compromised credentials

How cybersecurity strategies adapt to evolving threats

Cybersecurity strategies are essential components of modern organizations, designed to protect digital assets, sensitive information, and overall business continuity from potential cyber threats. As technology advances, the complexity and frequency of … Continue reading How cybersecurity strategies adapt to evolving threats