How CISOs enable ITDR approach through the principle of least privilege

Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. For a good reason, too: Look no further than the Change Healthcare breach, wher… Continue reading How CISOs enable ITDR approach through the principle of least privilege

Signatures should become cloud security history

It’s becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, Jimmy Mesta, CTO at RAD Security, discusses a new proposed standard for creati… Continue reading Signatures should become cloud security history

YetiHunter: Open-source threat hunting tool for Snowflake environments

Cloud identity protection company Permiso has created YetiHunter, a threat detection and hunting tool companies can use to query their Snowflake environments for evidence of compromise. YetiHunter executing queries (Source: Permiso Security) Recent att… Continue reading YetiHunter: Open-source threat hunting tool for Snowflake environments

Microsoft’s Security Copilot Enters General Availability

Microsoft’s AI chatbot and data aggregator is open for security business on April 1, with a new per-unit pricing model. Continue reading Microsoft’s Security Copilot Enters General Availability

Leveraging AI and automation for enhanced cloud communication security

In this Help Net Security interview, Sanjay Macwan, CIO and CISO at Vonage, addresses emerging threats to cloud communications and the role of AI and automation in cybersecurity. What emerging threats to cloud communications are you most concerned abou… Continue reading Leveraging AI and automation for enhanced cloud communication security

The power of AI in cybersecurity

The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber threat landscape and cybersecurity. AI as a powerful cybersecurity tool As organiza… Continue reading The power of AI in cybersecurity

Kaspersky releases utility to detect iOS spyware infections

Kaspersky’s researchers have developed a lightweight method to detect indicators of infection from sophisticated iOS spyware such as NSO Group’s Pegasus, QuaDream’s Reign, and Intellexa’s Predator through analyzing a log file created … Continue reading Kaspersky releases utility to detect iOS spyware infections

Best practices to mitigate alert fatigue

In this Help Net Security video, Peter Manev, Chief Strategy Officer at Stamus Networks, discusses a pervasive problem plaguing security analysts called “alert fatigue,” – which occurs when security teams become desensitized to an overwhelming volume o… Continue reading Best practices to mitigate alert fatigue