Cybersecurity measures SMBs should implement
Small and medium-sized businesses (SMBs) are targeted by cyberattackers as much as large companies, the 2023 Verizon Data Breach Investigations Report (DBIR) has revealed; here are some cybersecurity controls they should prioritize. Company size does.....»»
Why monitoring dark web traffic is crucial for cybersecurity teams
Why monitoring dark web traffic is crucial for cybersecurity teams.....»»
Dealerships warned about phishing scams tied to global cyber event
Two cybersecurity consulting firms are warning dealerships about scams relating to CrowdStrike's catastrophic software update on July 19......»»
Why CISOs face greater personal liability
In this Help Net Security interview, Christos Tulumba, CISO at Veritas Technologies, discusses the key factors contributing to increased personal liability risks for CISOs. These risks are driven by heightened cybersecurity threats, evolving regulati.....»»
Google won’t downrank top deepfake porn sites unless victims mass report
Google starts downranking more non-consensual intimate imagery in searches. Enlarge (credit: Paper Boat Creative | Stone) Today, Google announced new measures to combat the rapidly increasing spread of AI-generated non-c.....»»
Cybersecurity jobs available right now: July 31, 2024
Cloud Security Architect Precisely | United Kingdom | Remote – View job details As a Cloud Security Architect, you will be responsible for the design and architecture of Precisely’s cloud security posture. Determine security require.....»»
What CISOs need to keep CEOs (and themselves) out of jail
Former Uber CISO Joe Sullivan, who was convicted for attempting to cover up a data breach Uber suffered in 2016, recently posited that in the very near future, CEOs might find themselves held directly responsible for cybersecurity breaches. Consideri.....»»
The three cybersecurity blind spots affecting today’s CISOs
The three cybersecurity blind spots affecting today’s CISOs.....»»
Report urges bold measures for California agriculture amid climate change
California should take urgent and bold measures to adapt its $59 billion agriculture sector to climate change as the amount of water available for crops declines, according to a collaborative report by University of California faculty from four campu.....»»
Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
CVE-2023-45249, a critical vulnerability affecting older versions of Acronis Cyber Infrastructure, is being exploited by attackers. About Acronis Cyber Infrastructure Acronis is a privately held Swiss cybersecurity and data protection technology comp.....»»
The cost of cybersecurity burnout: Impact on performance and well-being
This article includes excerpts from recent reports we covered, providing statistics and insights into the levels of stress and burnout experienced by cybersecurity professionals. Most cybersecurity pros took time off due to mental health issues Hack.....»»
Week in review: CrowdStrike-triggered outage insights, recovery, and measuring cybersecurity ROI
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update By now, most people are aware of – or have been personally af.....»»
CrowdStrike largest IT outage in history; cost more than $5B
Cybersecurity researcher Troy Hunt – who runs the HaveIBeenPwned website – predicted that the CrowdStrike failure would set a record as the largest IT outage in history, and the numbers seem to back him up. Cyber insurance company Parametrix h.....»»
Most CISOs feel unprepared for new compliance regulations
With the new stringent regulations, including the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, a significant challenge is emerging for many organizations, according to Onyxia Cyber. CI.....»»
AI-generated deepfake attacks force companies to reassess cybersecurity
As AI-generated deepfake attacks and identity fraud become more prevalent, companies are developing response plans to address these threats, according to GetApp. In fact, 73% of US respondents report that their organization has developed a deepfake r.....»»
Weibo posts illuminate public response to China"s three-child policy measures
An analysis of comments on Chinese social media platform Sina Weibo reveals trends in the public response to measures implemented to support China's three-child policy, highlighting concerns about women's rights and employment. Lijuan Peng of Zhejian.....»»
Permit Share-If enables developers to implement secure collaboration features into their apps
Secure collaboration through access-sharing is a must-have feature in almost any modern application, from requesting to edit a document or viewing a widget in a dashboard to submitting wire transfers for approval. With “Permit Share-If,”.....»»
Cybersecurity ROI: Top metrics and KPIs
In this Help Net Security interview, Karthik Swarnam, Chief Security and Trust Officer at ArmorCode, discusses key metrics and KPIs to measure cybersecurity ROI. Swarnam shares strategies for enhancing ROI through proactive measures and effective com.....»»
Cybersecurity jobs available right now: July 24, 2024
Applied Cryptographer Quantstamp | EMEA | Remote – View job details As an Applied Cryptographer, you will research about various cryptographic protocols and have knowledge of cryptographic primitives or concepts, like elliptic curve c.....»»
AI accelerates code development faster than security teams can keep up
91% of respondents say their security budget is increasing this year, demonstrating a growing recognition of the importance of cybersecurity within organizations, according to Seemplicity. Vendor environments introduce complexity and fragmentation Se.....»»
SCW Trust Agent measures developers’ security competencies for code commits
Secure Code Warrior introduced SCW Trust Agent – a solution that assesses the specific security competencies of developers for every code commit. This innovative offering enables CISOs and application security (AppSec) teams to embrace a Secure-by-.....»»