Download: CIS Critical Security Controls v8.1
Version 8.1 of the CIS Critical Security Controls (CIS Controls) is an iterative update to version 8.0. It offers prescriptive, prioritized, and simplified cybersecurity best practices that provide a clear path to improve your organization’s cyber.....»»
Apple releases security updates for iOS 18.1.1, iPadOS 18.1.1, macOS 15.1.1
Apple has issued point releases for its operating systems, including iOS 18.1.1, iPadOS 18.1.1, macOS Sequoia 15.1.1, and visionOS 2.1.1.Currently-tested Apple Intelligence featuresThe updates for iOS 18.1.1, iPadOS 18.1.1, macOS Sequoia 15.1.1, and.....»»
Windows 365 Link Cloud PC: Connect securely to Windows 365
Microsoft unveiled Windows 365 Link, their first purpose-built Cloud PC device for instant, secure connection to Windows 365. Sign-in screen with USB security key option (Source: Microsoft) Windows 365 Link prioritizes security “We have heard c.....»»
Splunk simplifies infrastructure requirements for Microsoft Azure customers
Splunk announced its enterprise security, observability and platform offerings on Microsoft Azure. In partnering with Microsoft, Splunk empowers organizations to scale their digital transformation on Azure with unified solutions that accelerate innov.....»»
ReasonLabs launches Online Security platform for Android and iOS
ReasonLabs launched Online Security platform for Android and iOS, available for download on the Google Play Store and Apple App Store. This marks a significant milestone in ReasonLabs’ mission to deliver a comprehensive security platform that e.....»»
Onapsis Secure RISE Accelerator streamlines security elements of modern SAP deployments
Onapsis announced the Onapsis Secure RISE Accelerator, helping organizations execute their RISE with SAP transformation with confidence. The new offering reduces security and compliance obstacles with a structured, bundled solution that simplifies an.....»»
Tanium delivers autonomous controls that mitigate risk and maintain operational resiliency
Tanium unveiled new AI-powered autonomous innovations that transform how IT and Security teams execute change safely and reliably in their IT environments – at scale and in real-time. Tanium Autonomous Endpoint Management (AEM) enhances and extends.....»»
How can brands address growing consumer skepticism?
Transparency and effective communication are critical for brands to gain and keep consumer trust according to new research......»»
Space tech giant Maxar confirms attackers accessed employee data
Satellite and space technology leader Maxar Space Systems has suffered a data breach. “Our information security team discovered that a hacker using a Hong Kong-based IP address targeted and accessed a Maxar system containing certain files with.....»»
AlmaLinux 9.5 released: Security updates, new packages, and more!
AlmaLinux is a free, open-source, enterprise-grade Linux distribution. Governed and owned by the community, it offers a production-ready platform with binary compatibility to Red Hat Enterprise Linux. AlmaLinux 9.5, codenamed Teal Serval, is now avai.....»»
Oracle patches exploited Agile PLM vulnerability (CVE-2024-21287)
Oracle has released a security patch for CVE-2024-21287, a remotely exploitable vulnerability in the Oracle Agile PLM Framework that is, according to Tenable researchers, being actively exploited by attackers. About CVE-2024-21287 Oracle Agile PLM Fr.....»»
Belden announces products designed to enhance data security
Belden announces new network and data infrastructure products designed for secure, high-quality performance in critical applications. Data orchestration & management Hirschmann EAGLE40-6M Train Firewalls meet the demands of railway rolling stock with.....»»
Google report shows CISOs must embrace change to stay secure
Google’s latest report, conducted in partnership with Hypothesis Group, reveals a stark reality for organizations: incremental security measures are no longer sufficient. The study, involving over 2,000 decision-makers across the US, UK, India,.....»»
Why AI alone can’t protect you from sophisticated email threats
In this Help Net Security interview, Riaz Lakhani, CISO at Barracuda Networks, discusses the effectiveness of AI-based behavioural analysis in combating sophisticated email threats like BEC and VEC. Lakhani also explains how AI tools help detect mali.....»»
Dev + Sec: A collaborative approach to cybersecurity
The age-old tension between development and security teams has long been a source of friction in organizations. Developers prioritize speed and efficiency, aiming to deliver features and products quickly with a fast-paced, iterative development cycle.....»»
Security Bite: Why email security is still so bad
It’s a little-known fact that before emails reach your inbox, they pass through a buffer designed to scan and block malicious content. However, over time, email providers—especially Gmail—have shifted their focus to just adding “warning label.....»»
Researcher reverse engineers new iPhone security feature ‘Inactivity Reboot’
A recent report by 404 Media revealed that law enforcement agents have been concerned about automatically rebooting themselves, which makes it very difficult to hack these devices. Security researcher Jiska Classen later discovered that this behavio.....»»
Major security audit of critical FreeBSD components now available
The FreeBSD Foundation, in partnership with the Alpha-Omega Project, has released the results of an extensive security audit of two critical FreeBSD components: the bhyve hypervisor and the Capsicum sandboxing framework. The audit, conducted by the o.....»»
Transforming code scanning and threat detection with GenAI
In this Help Net Security interview, Stuart McClure, CEO of Qwiet AI, discusses the evolution of code scanning practices, highlighting the shift from reactive fixes to proactive risk management. McClure also shares his perspective on the future of AI.....»»
Navigating the compliance labyrinth: A CSO’s guide to scaling security
Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings up a visceral image, you’ve either seen David Bowie’s iconic film or are very familiar with the real-world challenge of complia.....»»
ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps
ScubaGear is an open-source tool the Cybersecurity and Infrastructure Security Agency (CISA) created to automatically evaluate Microsoft 365 (M365) configurations for potential security gaps. ScubaGear analyzes an organization’s M365 tenant configu.....»»