Advertisements


Fill the cybersecurity talent gap with inquisitive job candidates

The impact of the Great Resignation and the Great Reshuffle is still strongly felt across many industries, including cybersecurity. There is a talent gap: Companies are struggling to hire enough talent to fulfill their needs and goals. Widen the pool.....»»

Category: securitySource:  netsecurityOct 26th, 2022

So, how’s CrowdStrike doing?

CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»

Category: topSource:  digitaltrendsRelated NewsAug 29th, 2024

The NIS2 Directive: How far does it reach?

The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, the NIS2 Direct.....»»

Category: securitySource:  netsecurityRelated NewsAug 29th, 2024

Pioneer Kitten: Iranian hackers partnering with ransomware affiliates

A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

Diligent NIS2 Compliance Toolkit helps organizations bolster their cybersecurity resilience

Diligent launched its Network and Information Security Directive (NIS2) Compliance Toolkit, designed to help organizations navigate the complexities of the European Union (EU) NIS2 Directive and bolster their cybersecurity resilience. The toolkit map.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

Veeam Data Platform 12.2 extends data resilience to more platforms and applications

Veeam Software released Veeam Data Platform v12.2, broadening support for protecting data on an extensive range of new platforms while continuing to advance end-to-end cybersecurity capabilities. This latest release combines the most comprehensive da.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

Dragos Platform updates streamline OT threat and vulnerability workflows

Dragos announced the latest release of the Dragos Platform, an OT network visibility and cybersecurity platform. The updates provide industrial and critical infrastructure organizations with even deeper and enriched visibility into all assets in thei.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

Cybersecurity jobs available right now: August 28, 2024

Business Information Security Officer Toyota North America | USA | On-site – View job details Acting as an Information Security ambassador to the business, this role works with technology, data, risk, business, and the larger TFS Info.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

RSA Authenticator App improves cybersecurity for federal agencies

RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to improve th.....»»

Category: securitySource:  netsecurityRelated NewsAug 27th, 2024

After cybersecurity lab wouldn’t use AV software, US accuses Georgia Tech of fraud

Researchers allegedly found security protocols "burdensome." Enlarge (credit: Georgia Tech) Dr. Emmanouil "Manos" Antonakakis runs a Georgia Tech cybersecurity lab and has attracted millions of dollars in the last few ye.....»»

Category: topSource:  arstechnicaRelated NewsAug 23rd, 2024

GenAI models are easily compromised

95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»

Category: securitySource:  netsecurityRelated NewsAug 22nd, 2024

Why C-suite leaders are prime cyber targets

Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have targeted this group in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybers.....»»

Category: securitySource:  netsecurityRelated NewsAug 22nd, 2024

How changing automaker EV plans complicate suppliers" labor strategies

Some suppliers are cutting jobs because of slowdowns in automakers' electrification plans, often reluctantly so because of how difficult it can be to fill roles to begin with, executives and industry analysts said......»»

Category: topSource:  autonewsRelated NewsAug 21st, 2024

Cybersecurity jobs available right now: August 21, 2024

Associate Cybersecurity Operations Officer UNICC | USA | On-site – View job details The Center aims to provide trusted ICT services and digital business solutions. You will work under the direct supervision and guidance of the Head of.....»»

Category: securitySource:  netsecurityRelated NewsAug 21st, 2024

Experts study immigration in relation to jobs, crime and disease

According to the U.S. Census Bureau, immigrants made up 13.9% of the total population in 2022. Among them are highly skilled workers who fill critical gaps in high-tech industries as well as those who construct the buildings in which we live and who.....»»

Category: topSource:  physorgRelated NewsAug 20th, 2024

Strategies for security leaders: Building a positive cybersecurity culture

Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization. Culture can also greatly enhance the perceived value, relevance and reputation of the cybersecurity fu.....»»

Category: securitySource:  netsecurityRelated NewsAug 20th, 2024

Sea anemone study identifies potentially regenerative stem cells linked to conserved genes

The sea anemone Nematostella vectensis is potentially immortal. Using molecular genetic methods, developmental biologists led by Ulrich Technau from the University of Vienna have now identified possible candidates for multipotent stem cells in the se.....»»

Category: topSource:  marketingvoxRelated NewsAug 19th, 2024

Protecting academic assets: How higher education can enhance cybersecurity

Cyber attacks against higher education institutions increased by 70% in 2023. This is largely due to legacy endpoint security management and practices, limited IT support staff, and overwhelming amounts of data, much of which is PII (personally ident.....»»

Category: securitySource:  netsecurityRelated NewsAug 19th, 2024

To improve your cybersecurity posture, focus on the data

Effectively converging, managing and using enterprise data is a huge undertaking. Enterprises have vast hoards of data, but those hoards exist within siloed systems and applications, and it requires a lot of manual effort by highly skilled data scien.....»»

Category: securitySource:  netsecurityRelated NewsAug 19th, 2024

How NoCode and LowCode free up resources for cybersecurity

In this Help Net Security video, Frederic Najman, Executive Member of the SFPN (French Union of NoCode Professionals), discusses how NoCode and LowCode technologies enable companies to free up development resources to tackle cybersecurity issues. In.....»»

Category: securitySource:  netsecurityRelated NewsAug 16th, 2024

Recycling can help fill battery materials shortages

Battery manufacturing scrap and spent EV and electronic device batteries provide a ready supply of needed materials.....»»

Category: topSource:  autonewsRelated NewsAug 14th, 2024