How the downmarket impacted enterprise cybersecurity budgets
Belts have tightened, and that ROI and cost reduction are now driving CISO decision-making more than ever. In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how enterprise cybersecurity budgets have been impacted.....»»
The importance of the Vulnerability Operations Centre for cybersecurity
The importance of the Vulnerability Operations Centre for cybersecurity.....»»
Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)
The newest version of Ivanti Avalanche – the company’s enterprise mobile device management (MDM) solution – carries fixes for 27 vulnerabilities, two of which (CVE-2024-29204, CVE-2024-24996) are critical and may allow a remote unau.....»»
Redgate Monitor Enterprise prevents unauthorized access to sensitive information
Redgate has launched an enterprise version of its popular database monitoring tool, providing a range of new features to address the challenges of scale and complexity faced by larger organizations. Redgate Monitor Enterprise offers advanced capabili.....»»
Enterprises face significant losses from mobile fraud
A recent Enea survey highlights a worrying trend in enterprise security: Following ChatGPT’s launch, 76% of businesses are inadequately protected against rising AI-driven vishing and smishing threats. In this Help Net Security video, John Hughe.....»»
92% of enterprises unprepared for AI security challenges
Most industries continue to run almost two or more months behind in patching software vulnerabilities, endpoints remain vulnerable to threats, and most enterprise PCs must be replaced to support AI-based technologies, according to the Absolute Securi.....»»
Unique field study shows how climate change affects fire-impacted forests
During the unusually dry year of 2018, Sweden was hit by numerous forest fires. A research team led from Lund University in Sweden has investigated how climate change affects recently burned boreal forests and their ability to absorb carbon dioxide......»»
EU cybersecurity label for cloud computing vote pushed back once again
Cloud service security label will hopefully guarantee EU data safety, but regulatory erosion is putting security at risk......»»
Cybersecurity jobs available right now: April 17, 2024
Client Security Officer Unisys | USA | Remote – View job details The Client Security Officer (CSO) is part of Unisys account management team servicing its clients as cybersecurity representative alongside the Client Executive and the.....»»
The best processor for video editing in 2024 across all budgets
These are the best CPUs for video editing, each with high clock speeds, lots of cores, and all the power you need......»»
Why the US government’s overreliance on Microsoft is a big problem
Microsoft continues to get a free pass after series of cybersecurity failures. Enlarge (credit: Joan Cros via Getty) When Microsoft revealed in January that foreign government hackers had once again breached its systems,.....»»
Sectigo SCM Pro automates certificate management
Sectigo launched SCM Pro, a solution to bring the robustness of enterprise CLM to Small and midsize enterprises (SMEs), effectively leveling the playing field between large enterprises and the mid-market. Online identity proliferation, hybrid work, a.....»»
GuidePoint Security introduces IoT Security Assessment
GuidePoint Security announced its IoT Security Assessment, a new cybersecurity service. GuidePoint Security’s team of IoT security and embedded systems experts have extensive experience identifying potential weaknesses in IoT devices and applicatio.....»»
5 free red teaming resources to get you started
Red teaming is evaluating the effectiveness of your cybersecurity by eliminating defender bias and adopting an adversarial perspective within your organization. Tactics may include anything from social engineering to physical security breaches to sim.....»»
AI set to enhance cybersecurity roles, not replace them
In this Help Net Security interview, Caleb Sima, Chair of CSA AI Security Alliance, discusses how AI empowers security pros, emphasizing its role in enhancing skills and productivity rather than replacing staff. AI is seen as empowering rather than r.....»»
eBook: Why CISSP?
As new cyber threats emerge daily in our connected world, there’s never been a greater urgency for cybersecurity professionals than now. What can CISSP certification do for you? In the eBook, hear from cybersecurity experts on how certification: Gi.....»»
Expand your library with these cybersecurity books
In this Help Net Security video round-up, authors discuss their cybersecurity books and provide an inside look at each title. Complete videos George Finney, CSO at Southern Methodist University, talks about his book – “Project Zero Trust: A Story.....»»
Salmon fishing off California"s coast banned for second year in a row
Salmon fishing off the coast of California will be banned for a second consecutive year, authorities said Wednesday, citing lower fish stocks impacted by drought and wildfires......»»
The inevitable risks and best defense for cloud cybersecurity
The inevitable risks and best defense for cloud cybersecurity.....»»
Why women struggle in the cybersecurity industry
The workplace experiences of women in cybersecurity are dramatically worse than men across virtually every category, according to a WiCyS and Aleria survey. Previous studies have illustrated that the representation of women in cybersecurity is much l.....»»
CISA warns about Sisense data breach
Business intelligence / data analytics software vendor Sisense has apparently suffered a data breach that spurred the company and the US Cybersecurity and Infrastructure Security Agency to push the company’s customers to “reset credential.....»»