433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Pentera’s security validation platform reduces corporate cybersecurity risk

Pentera launched a unified security validation platform that combines External Attack Surface Management (EASM), Breach and Attack Simulation (BAS) and automated penetration testing. Recently elevated to unicorn status, Pentera autonomously emulates the entire cyberattack kill chain, from external-facing assets all the way to the core of the enterprise, thus revealing the most risk-bearing security gaps. The platform frequently tests organizations’ entire attack surface to identify exploitable vulnerabilities and delivers an actionable strategy to solidify their … More → The post Pentera’s security validation platform reduces corporate cybersecurity risk appeared first on Help Net Security.
http://news.poseidon-us.com/SHl8zm

Borderless Security launches FilesDNA to protect electronic document sharing

Borderless Security launched FilesDNA, an e-signature solution that lends the integration of the company’s custom security protocols into a new offering for digital management of files and contracts being shared globally. FilesDNA leverages blockchain technology to create a safe, secure and convenient solution for signing paperwork, contracts and legally binding documents. Driven by AI and ML integration, FilesDNA provides a user-friendly process for ID verification of every signed user, to eliminate fraudulent activities via blockchain … More → The post Borderless Security launches FilesDNA to protect electronic document sharing appeared first on Help Net Security.
http://news.poseidon-us.com/SHl8kV

Borderless Security launches FilesDNA to protect electronic document sharing

Borderless Security launched FilesDNA, an e-signature solution that lends the integration of the company’s custom security protocols into a new offering for digital management of files and contracts being shared globally. FilesDNA leverages blockchain technology to create a safe, secure and convenient solution for signing paperwork, contracts and legally binding documents. Driven by AI and ML integration, FilesDNA provides a user-friendly process for ID verification of every signed user, to eliminate fraudulent activities via blockchain … More → The post Borderless Security launches FilesDNA to protect electronic document sharing appeared first on Help Net Security.
http://news.poseidon-us.com/SHl8kV

Deepfence ThreatMapper 1.2.0 helps DevSecOps professionals identify critical vulnerabilities

Deepfence released ThreatMapper 1.2.0, which offers significant feature upgrades since the first fully open source release of the project in October 2021. ThreatMapper 1.2.0 adds several in-demand features, including Attack Path Visualization, with a more sophisticated and representative calculation of the Most Exploitable Vulnerabilities, support for discovering and scanning AWS Fargate workloads for vulnerabilities, ARM support, and support for integration with Google Chronicle. Deepfence also has added several community-inspired performance improvements and bugfixes, including better … More → The post Deepfence ThreatMapper 1.2.0 helps DevSecOps professionals identify critical vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/SHl8Wz

Deepfence ThreatMapper 1.2.0 helps DevSecOps professionals identify critical vulnerabilities

Deepfence released ThreatMapper 1.2.0, which offers significant feature upgrades since the first fully open source release of the project in October 2021. ThreatMapper 1.2.0 adds several in-demand features, including Attack Path Visualization, with a more sophisticated and representative calculation of the Most Exploitable Vulnerabilities, support for discovering and scanning AWS Fargate workloads for vulnerabilities, ARM support, and support for integration with Google Chronicle. Deepfence also has added several community-inspired performance improvements and bugfixes, including better … More → The post Deepfence ThreatMapper 1.2.0 helps DevSecOps professionals identify critical vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/SHl8Wz

Red vs. blue vs. purple teams: How to run an effective exercise

In the arsenal of cybersecurity defenses is the exercise that goes by the name of red team/blue team simulated attack. These simulations are designed to closely mimic real-world conditions. For example, one red team member might take on the role of an employee clicking on a phishing link that deposits malware on the network. The defending team members must then find this malware before it spreads across their network and infects web servers and other applications. To make things more realistic, the simulation replays real network traffic to obscure the attacks, just like in the real world. Let’s talk about the red and blue designations. Red team members usually play the role of attackers and try to overcome security protocols. They use the same tools and techniques that attackers use, similar to how penetration testers operate but on a much broader scale. To read this article in full, please click here
http://news.poseidon-us.com/SHhXLn