automation

Preparing for a post-quantum future

Preparing for a post-quantum future 2024-06-18 at 06:31 By Help Net Security Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This has sparked questions about the strength of soon-to-be-standardized PQC algorithms. In this Help Net Security video, Kevin […]

React to this headline:

Loading spinner

Preparing for a post-quantum future Read More »

42% plan to use API security for AI data protection

42% plan to use API security for AI data protection 2024-06-18 at 06:01 By Help Net Security While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems companies put in place to obtain, store, and secure it are

React to this headline:

Loading spinner

42% plan to use API security for AI data protection Read More »

AI’s role in accelerating vulnerability management

AI’s role in accelerating vulnerability management 2024-06-10 at 08:01 By Help Net Security With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management specifically, AI is poised to have a profound impact, enhancing two key areas: Providing quicker analysis and

React to this headline:

Loading spinner

AI’s role in accelerating vulnerability management Read More »

Why CISOs need to build cyber fault tolerance into their business

Why CISOs need to build cyber fault tolerance into their business 2024-06-10 at 07:01 By Help Net Security CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to outdated zero tolerance for failure mindsets, according to Gartner. “Each new cybersecurity disruption exposes the fact that

React to this headline:

Loading spinner

Why CISOs need to build cyber fault tolerance into their business Read More »

Establishing a security baseline for open source projects

Establishing a security baseline for open source projects 2024-05-13 at 08:01 By Mirko Zorz In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) and opportunities for overcoming these challenges. The OpenSSF community has developed open-source security tools and projects, aiming

React to this headline:

Loading spinner

Establishing a security baseline for open source projects Read More »

reNgine: Open-source automated reconnaissance framework for web applications

reNgine: Open-source automated reconnaissance framework for web applications 2024-05-02 at 07:31 By Mirko Zorz reNgine is an open-source automated reconnaissance framework for web applications that focuses on a highly configurable and streamlined recon process. Developing reNgine reNgine was developed to overcome the constraints of conventional reconnaissance tools. It is a good choice for bug bounty

React to this headline:

Loading spinner

reNgine: Open-source automated reconnaissance framework for web applications Read More »

Tracecat: Open-source SOAR

Tracecat: Open-source SOAR 2024-04-30 at 07:31 By Mirko Zorz Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially understaffed small- to mid-sized teams. Core features, user interfaces, and day-to-day workflows are based on existing best practices from best-in-class security teams. Use specialized AI models

React to this headline:

Loading spinner

Tracecat: Open-source SOAR Read More »

Security analysts believe more than half of tasks could be automated

Security analysts believe more than half of tasks could be automated 2024-04-30 at 06:01 By Help Net Security Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI expected to boost threat detection In fact, security analysts maintain that up to 57%

React to this headline:

Loading spinner

Security analysts believe more than half of tasks could be automated Read More »

Tines Bags $50 Million Funding for Security Workflow Automation

Tines Bags $50 Million Funding for Security Workflow Automation 2024-04-24 at 17:17 By Ryan Naraine Irish startup Tines raises $50 million in new venture capital funding as investors make big bets on automation and orchestration startups. The post Tines Bags $50 Million Funding for Security Workflow Automation appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Tines Bags $50 Million Funding for Security Workflow Automation Read More »

Welcome to the future where on-chain robots serve coffee and crypto rewards

Welcome to the future where on-chain robots serve coffee and crypto rewards 2024-04-18 at 16:01 By Cointelegraph by Savannah Fortis Blockchain-driven robots served coffee with a side of crypto incentives at Token2049 in Dubai in a bid to revolutionize our relationship with automation. This article is an excerpt from Cointelegraph.com News View Original Source React

React to this headline:

Loading spinner

Welcome to the future where on-chain robots serve coffee and crypto rewards Read More »

Strategies to cultivate collaboration between NetOps and SecOps

Strategies to cultivate collaboration between NetOps and SecOps 2024-04-12 at 07:31 By Mirko Zorz In this Help Net Security interview, Debby Briggs, CISO at Netscout, discusses breaking down silos between NetOps and SecOps. Practical steps include scheduling strategy meetings, understanding communication preferences, and fostering team collaboration. With evolving cloud models, collaboration and clear role assignments

React to this headline:

Loading spinner

Strategies to cultivate collaboration between NetOps and SecOps Read More »

How Google’s 90-day TLS certificate validity proposal will affect enterprises

How Google’s 90-day TLS certificate validity proposal will affect enterprises 2024-04-11 at 08:01 By Help Net Security Announced last year, Google’s proposal to reduce the lifespan of TLS (transport layer security) certificates from 13 months to 90 days could be implemented in the near future. It will certainly improve security and shrink the window of

React to this headline:

Loading spinner

How Google’s 90-day TLS certificate validity proposal will affect enterprises Read More »

Six steps for security and compliance in AI-enabled low-code/no-code development

Six steps for security and compliance in AI-enabled low-code/no-code development 2024-04-04 at 08:02 By Help Net Security AI is quickly transforming how individuals create their own apps, copilots, and automations. This is enabling organizations to improve output and increase efficiency—all without adding to the burden of IT and the help desk. But while this transformation

React to this headline:

Loading spinner

Six steps for security and compliance in AI-enabled low-code/no-code development Read More »

Why AI forensics matters now

Why AI forensics matters now 2024-04-02 at 07:01 By Help Net Security In this Help Net Security video, Sylvia Acevedo, who serves on the Boards of Qualcomm and Credo, discusses why companies should invest in forensic capabilities and why forensics will be such an important topic as AI continues to be integrated into infrastructures and

React to this headline:

Loading spinner

Why AI forensics matters now Read More »

AI weaponization becomes a hot topic on underground forums

AI weaponization becomes a hot topic on underground forums 2024-03-28 at 06:31 By Help Net Security The majority of cyberattacks against organizations are perpetrated via social engineering of employees, and criminals are using new methods including AI to supercharge their techniques, according to ReliaQuest. Some 71% of all attacks trick employees via the use of

React to this headline:

Loading spinner

AI weaponization becomes a hot topic on underground forums Read More »

Security best practices for GRC teams

Security best practices for GRC teams 2024-03-20 at 06:31 By Help Net Security Even with the best-of-the-best tools and tech stack monitoring vulnerabilities, every security executive and GRC leader should still have some layer of paranoia. If they don’t, that’s a huge issue. In this Help Net Security video, Shrav Mehta, CEO at Secureframe, talks

React to this headline:

Loading spinner

Security best practices for GRC teams Read More »

Why is everyone talking about certificate automation?

Why is everyone talking about certificate automation? 2024-03-19 at 07:19 By Help Net Security Digital Certificates are not new. In this Help Net Security video, Andreas Brix, Senior Program Manager at GlobalSign, discusses why they are back in the news and what you should do about it. The post Why is everyone talking about certificate

React to this headline:

Loading spinner

Why is everyone talking about certificate automation? Read More »

How teams can improve incident recovery time to minimize damages

How teams can improve incident recovery time to minimize damages 2024-03-14 at 06:30 By Help Net Security With breach recovery costs skyrocketing, speeding time to recovery to minimize downtime and losses should be top of mind for security leaders. Yet, most focus on adding more prevention and detection tools. In this Help Net Security video,

React to this headline:

Loading spinner

How teams can improve incident recovery time to minimize damages Read More »

Advanced AI, analytics, and automation are vital to tackle tech stack complexity

Advanced AI, analytics, and automation are vital to tackle tech stack complexity 2024-03-11 at 06:32 By Help Net Security 97% of technology leaders find traditional AIOps models are unable to tackle the data overload, according to Dynatrace. Organizations are drowning in data The research reveals that organizations are continuing to embrace multi-cloud environments and cloud-native

React to this headline:

Loading spinner

Advanced AI, analytics, and automation are vital to tackle tech stack complexity Read More »

Leveraging AI and automation for enhanced cloud communication security

Leveraging AI and automation for enhanced cloud communication security 2024-03-08 at 07:32 By Mirko Zorz In this Help Net Security interview, Sanjay Macwan, CIO and CISO at Vonage, addresses emerging threats to cloud communications and the role of AI and automation in cybersecurity. What emerging threats to cloud communications are you most concerned about, and

React to this headline:

Loading spinner

Leveraging AI and automation for enhanced cloud communication security Read More »

Scroll to Top