Start-Up Nation Central, the independent not-for-profit organization connecting global corporations, investors, and governments to the Israeli tech innovation ecosystem, revealed that Israel’s FinTech sector experienced a record-breaking first half of 2021 in terms of VC investments. According to a data gathered from Start-Up Nation Central Finder, Israeli companies raised $2.3B in the first half representing a staggering 260% increase over H1 2020 funding, and even surpassing the 2020 full-year total of $1.8B by 28%. Investments … More →
The post Israeli companies get $2.3B of VC funding in the first half of 2021, surpassing the 2020 total by 28% appeared first on Help Net Security.
IBM announced IBM z/OS V2.5, the next-generation operating system (OS) for IBM Z, designed to accelerate client adoption of hybrid cloud and AI and drive application modernization projects. According to an IBM Institute for Business Value study “Application modernization on the mainframe” released today, 71% of executives surveyed say mainframe-based applications are central to their business strategy; and in three years, the percentage of organizations leveraging mainframe assets in a hybrid cloud environment is expected … More →
The post IBM z/OS V2.5 strengthens security and drives app modernization projects appeared first on Help Net Security.
A little over $3,000 — that’s how much stolen corporate network credentials tend to go for on the dark web. Although the exact asking price for an individual’s credentials may depend on several factors, like how much revenue their enterprise makes, particularly valuable organizations may even see their login details auctioned off for as much as $120,000. While a successful ransomware attack is capable of fetching cybercriminals almost 10 times as much in ransom, even … More →
The post How to prevent corporate credentials ending up on the dark web appeared first on Help Net Security.
As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The findings are part of the State of Cloud Security 2021 survey conducted by Fugue and Sonatype. Serious cloud security data leak The survey of 300 cloud pros (including cloud engineers; security engineers; DevOps; architects) found that 36% of organizations suffered a serious cloud security data leak or a breach in … More →
The post 36% of organizations suffered a serious cloud security data leak or a breach in the past year appeared first on Help Net Security.
Account takeovers (ATOs) are on the rise, fueled by the widespread use of automated bots. The media industry, which includes social networks, content streaming, gambling, gaming, and online dating sites, is seeing attacks on new account creation processes at a higher rate than any other industry in the second half of 2020, according to a recent report by LexisNexis Risk Solutions. Fraudsters often test stolen identity data via media organizations. The media industry recorded significant … More →
The post Turning the tide on surging account takeovers in the media industry appeared first on Help Net Security.
Software and hardware vulnerabilities are an ever-present threat to every enterprise. In response to the tedious and time-consuming processes often associated with traditional vulnerability management, enterprise IT administrators have started looking for better alternatives that can integrate with their existing IT management framework. In this product showcase, we bring to you Vulnerability Manager Plus from ManageEngine. Vulnerability Manager Plus is an enterprise security program that can be used as a stand-alone tool as well as … More →
The post Product showcase: ManageEngine Vulnerability Manager Plus appeared first on Help Net Security.
An overwhelming percentage (75%) of CISOs consider their organization to be at greater risk of a cybersecurity attack due to the transition to home working, with a third admitting they’ve taken their eye off the ball during these past 12 months losing track of leavers and devices, according to a new survey from BlueFort Security, a provider of cybersecurity solutions. The study, which surveyed 600 CISOs from a variety of UK organizations, found that the … More →
The post CISOs operating blind, with limited visibility and control appeared first on Help Net Security.
With concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from Trulioo, 84% of people believe that businesses will need to rely more on automated fraud protection to protect customers as fraudsters become more sophisticated. The research revealed positive attitudes towards a number of newer methods of identity authentication amongst consumers in China, the UK and the U.S. Almost three quarters (74%) … More →
The post Consumer attitudes towards various digital identity authentication methods appeared first on Help Net Security.
Consumer reliance on applications and digital services has soared since the start of the COVID-19 pandemic. A new global study by Cisco AppDynamics, which examined the digital behaviors of more than 13,000 global consumers, also identified consumers now have a zero-tolerance policy for poor application experience and automatically place blame on the application and brand, no matter where a performance issue stems from. Consumers and the reliance on digital services Since the start of 2020, … More →
The post Consumer expectations of digital services increased since early 2020 appeared first on Help Net Security.
Congress Rental Network Partner, Smart Choice Audiovisuais, has installed a large Dicentis conferencing and interpretation system at Centro Cultural de Belém, the Portuguese EU Presidency Headquarters in Lisbon. A total of 70 Dicentis and 50 Dicentis Wireless Discussion devices with touchscreens provide the main input. The solution can be used to deliver in-person meetings at the venue, as well as remote and hybrid meetings to overcome the challenges presented by the COVID-19 pandemic. The core … More →
The post Bosch provides conferencing and interpretation equipment for high-profile meetings appeared first on Help Net Security.
Blue Hexagon announced the native integration of Blue Hexagon’s real-time deep learning based threat detection with AWS Network Firewall for real-time protection. This integration provides protection against known threats, variants of known threats, as well as unknown 0-day threats for which no signatures exist. As a cloud security platform, for actionable visibility, real-time threat defense and continuous compliance, this integration underscores Blue Hexagon’s commitment to delivering innovative solutions to the AWS customers who need to … More →
The post Blue Hexagon integrates with AWS Network Firewall to offer protection against unknown cloud threats appeared first on Help Net Security.
Cloud at Work announced that it has been selected by Sage as an approved Strategic Hosting Provider to help Sage Partners migrate customers to the cloud. Cloud at Work allows Sage customers in the U.S. currently using on-premises solutions, including Sage 100, Sage 300, and Sage CRE, to realize the increased performance, efficiencies and financial benefits of SaaS, with the Sage support and SaaS expertise of the Cloud at Work team. This announcement reaffirms the … More →
The post Sage selects Cloud at Work as an approved Strategic Hosting Provider appeared first on Help Net Security.
Clearview AI announced the successful close of a $30 million Series B funding round that now values the company at $130 million. The investment, which includes funds from institutional investors and family offices, will fuel Clearview’s continued growth. “Law enforcement agencies continue to evolve and adopt new technology by necessity, and Clearview’s revolutionary image search and identification capabilities have proven to be a game-changer in bringing unidentified criminals to justice,” said Hoan Ton-That, Co-Founder and … More →
The post Clearview AI raises $30M to accelerate growth in image-search technology appeared first on Help Net Security.
IMS Digital Ventures announced the closing of a US$ 1.5M pre-seed round of OwlGaze in which it acted as the lead investor. OwlGaze offers companies an end-to-end predictive threat detection solution to identify, prioritise and prevent cyber attacks using advanced correlation and AI technology. Globally, companies ranging from small startups to large enterprises are increasingly affected by cyber threats and they struggle to keep up. “We do not only see a growth in the number … More →
The post OwlGaze raises $1.5M to offer companies an end-to-end predictive threat detection solution appeared first on Help Net Security.
Boutique cloud engineering and agile DevOps firm, Hunter Strategy, announced their entrance to Google Cloud‘s partner network. This strategic partnership certifies Hunter’s technical expertise in agile cloud development. As a Google Cloud Partner, Hunter joins a premier alliance of Cloud engineers to expand services offerings around cloud advisory, migration, software security, automation, orchestration, and robust managed services capabilities. “We are honored to partner with Google Cloud and serve at the intersection of defensive DevOps and … More →
The post Hunter Strategy enters Google Cloud Partner Advantage Program appeared first on Help Net Security.
What skills should aspiring information security workers possess and work on? What certifications can come in handy more than others? What strategies should organizations employ to develop a well-staffed cybersecurity team? Where should they look for talent? What advice do those already working in the field have for those who want to enter it? (ISC)² wanted to know the answer to these and other questions, so they asked 1,024 infosec professionals and 1,010 cybersecurity job … More →
The post How to develop a skilled cybersecurity team appeared first on Help Net Security.
To realize the full potential of online services, identity verification solutions are required to avoid fraud and boost trust in the systems, for both end users and organizations. In-person data verification can be performed by a service agent easily, usually by asking for a physical ID card, like a driver’s license, and referencing it against the application documents and person present, but how can this be done online? Enter verifiable credentials. Verifiable credentials provide a … More →
The post Verifiable credentials are key to the future of online privacy appeared first on Help Net Security.
Application programming interfaces (APIs) are at the core of nearly every digital experience – whether that is the delivery of mobile apps that enable consumers to monitor and personalize their exercise routines using an IoT connected device, or making it easy for car owners to track and share their in-vehicle driving behaviors with an insurer, or enabling remote monitoring services that allow patients with chronic conditions to record and report their daily stats and receive … More →
The post Ignore API security at your peril appeared first on Help Net Security.
According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating that the default security capabilities of containers are overestimated. This result is especially alarming in conjunction with the fact that only 24% of respondents have plans in place to deploy the necessary building blocks for runtime security. “The results of the survey showcase a staggering knowledge gap that leads … More →
The post The knowledge gap around runtime security and the associated risks appeared first on Help Net Security.
NortonLifeLock’s global research team Norton Labs published its second quarterly Consumer Cyber Safety Pulse Report, detailing the top consumer cybersecurity insights and takeaways from April to June 2021. The analysis reveals the three most common phishing scams, in addition to new threats in encrypted chat marketplaces, online cookies, and vulnerable gaming drivers. Consumer cybersecurity insights: April to June 2021 Norton thwarted 23.7 million phishing attempts between April and June 2021, with tech support scams, survey … More →
The post Top consumer cybersecurity insights and takeaways from April to June 2021 appeared first on Help Net Security.
Daily information security news with a focus on enterprise security.
Subscribe to Help Net Security feed