Assessing the cybersecurity implications of AI for organizations
AI platforms are fast becoming indispensable in the workplace, Pierre Samson explores the risks......»»
Dealerships warned about phishing scams tied to global cyber event
Two cybersecurity consulting firms are warning dealerships about scams relating to CrowdStrike's catastrophic software update on July 19......»»
Wing Security unveils custom SaaS Threat Intelligence for direct dashboard integration
Wing Security launched its new tailored SaaS Threat Intelligence, providing organizations with personalized detection and response capabilities directly integrated into their SaaS security dashboard. The threat intelligence feature delivers timely, p.....»»
Why CISOs face greater personal liability
In this Help Net Security interview, Christos Tulumba, CISO at Veritas Technologies, discusses the key factors contributing to increased personal liability risks for CISOs. These risks are driven by heightened cybersecurity threats, evolving regulati.....»»
Threat intelligence: A blessing and a curse?
Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that security teams are blessed with an abundance of data and intelligence feeds to choose from. However, selecting the right.....»»
Fortanix expands Key Insight to enhance cryptographic security across hybrid environments
Fortanix announced a major expansion to the Key Insight solution, allowing organizations to discover, assess, and remediate their fragmented cryptographic security risks proactively. Key Insight can now scan on-premises services such as databases, st.....»»
Proficio launches ProBAS service to help organizations better prepare and respond to cyber attacks
Proficio has announced the roll out of its ProBAS Breach and Attack Simulation service. By rigorously testing an organization’s security defenses, ProBAS ensures they can prevent compromise events and detect attacks throughout the entire threat det.....»»
Cybersecurity jobs available right now: July 31, 2024
Cloud Security Architect Precisely | United Kingdom | Remote – View job details As a Cloud Security Architect, you will be responsible for the design and architecture of Precisely’s cloud security posture. Determine security require.....»»
What CISOs need to keep CEOs (and themselves) out of jail
Former Uber CISO Joe Sullivan, who was convicted for attempting to cover up a data breach Uber suffered in 2016, recently posited that in the very near future, CEOs might find themselves held directly responsible for cybersecurity breaches. Consideri.....»»
Sports partnerships with not-for-profits show lackluster results, study finds
Partnerships between professional sports teams and not-for-profit organizations (NPOs) are often weakened by power imbalances, informality and a lack of strategic intent, according to new research led by RMIT University......»»
The three cybersecurity blind spots affecting today’s CISOs
The three cybersecurity blind spots affecting today’s CISOs.....»»
Review: Action1 – Simple and powerful patch management
Although endpoint anti-malware and other security controls are now standard at the operating system level, keeping all endpoint software up-to-date and secure remains an open issue for many organizations. Patch management is not yet a commodity, and.....»»
Insecure file-sharing practices in healthcare put patient privacy at risk
Healthcare organizations continue to put their business and patients at risk of exposing their most sensitive data, according to Metomic. 25% of publicly shared files owned by healthcare organizations contain Personally Identifiable Information (PII).....»»
How an emerging disease in dogs is shedding light on cystic fibrosis
A canine gallbladder disease that involves the accumulation of abnormal mucus similar to that seen in human cystic fibrosis (CF) patients is caused by improper expression of the gene associated with CF in humans. The finding could have implications f.....»»
Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
CVE-2023-45249, a critical vulnerability affecting older versions of Acronis Cyber Infrastructure, is being exploited by attackers. About Acronis Cyber Infrastructure Acronis is a privately held Swiss cybersecurity and data protection technology comp.....»»
eBook: 20 tips for secure cloud migration
More organizations rely on cloud platforms to reap the benefits of scalability, flexibility, availability, and reduced costs. However, cloud environments come with security challenges and vulnerabilities. The Thales 2020 Data Threat Report indicates.....»»
The cost of cybersecurity burnout: Impact on performance and well-being
This article includes excerpts from recent reports we covered, providing statistics and insights into the levels of stress and burnout experienced by cybersecurity professionals. Most cybersecurity pros took time off due to mental health issues Hack.....»»
Week in review: CrowdStrike-triggered outage insights, recovery, and measuring cybersecurity ROI
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update By now, most people are aware of – or have been personally af.....»»
Outsourcing conservation in Africa: NGO management reduces poaching and boosts tourism, but raises risks for civilians
There's an experiment going on in conservation in Africa. With biodiversity imperiled, and nations facing financial and political crises, some governments are transferring the management of protected areas to private, non-governmental organizations (.....»»
AI makes useless noise widely useful in synchronizing physical oscillators
In a Letter published in Physical Review E, scientists from the Research Institute of Intelligent Complex Systems (IICS) at the Fudan University show AI makes useless noise widely useful in oscillator synchronization. These findings have implications.....»»
CrowdStrike largest IT outage in history; cost more than $5B
Cybersecurity researcher Troy Hunt – who runs the HaveIBeenPwned website – predicted that the CrowdStrike failure would set a record as the largest IT outage in history, and the numbers seem to back him up. Cyber insurance company Parametrix h.....»»