How the pandemic is shaping US security policy
The COVID-19 pandemic was one of the most serious crises since the end of World War II, taking a staggering human and economic toll across the planet. As the world gets up again, groggily, like a punch-drunk fighter, it's become increasingly clear th.....»»
Who handles what? Common misconceptions about SaaS security responsibilities
In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common.....»»
Resecurity introduces AI-powered GSOC at NATO Edge 2024
Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and Information Agency’s flagship conference. This year’s event, held from D.....»»
Echoworx enhances secure access to encrypted messages
Echoworx announced the addition of 2-Step Verification (2SV) when using OAuth and Passkeys for authentication for encrypted messages. This latest enhancement offers organizations an additional layer of security, addressing the growing demand for iden.....»»
How to choose secure, verifiable technologies?
The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring.....»»
New infosec products of the week: December 6, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Datadog, Fortinet, Radiant Logic, Sweet Security, Tenable, and Veza. FortiAppSec Cloud simplifies web application security management With FortiAppSec Cloud,.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Building a robust security posture with limited resources
In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by legacy systems, and build defenses for startups. Lindahl-Wise also highlights.....»»
Navigating crises: The financial adaptations of NGOs during the COVID-19 pandemic
Demand for NGO services usually increases in times of crisis. However, a new study led by Kaunas University of Technology (KTU) in Lithuania has found that the COVID-19 pandemic had a mixed impact on NGOs working in Lithuania, Croatia, Poland and the.....»»
Scientists identify mutation that could facilitate H5N1 bird flu virus infection and potential transmission in humans
Avian influenza viruses typically require several mutations to adapt and spread among humans, but what happens when just one change can increase the risk of becoming a pandemic virus?.....»»
Download: The Ultimate Guide to the CCSP
Even the brightest minds benefit from guidance on the journey to success. The Ultimate Guide to the CCSP covers everything you need to know about the world’s leading cloud security certification. Learn how CCSP – and ISC2 – can help you discove.....»»
8 US telcos compromised, FBI advises Americans to use encrypted communications
FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the networks a.....»»
Building trust in tokenized economies
As the tokenized economy expands, the digital landscape is reshaped by decentralized systems and new forms of asset ownership. In this Help Net Security video, Jeremy Bradley, COO of Zama, explores the emerging privacy-preserving technologies that ca.....»»
How the Shadowserver Foundation helps network defenders with free intelligence feeds
In this Help Net Security interview, Piotr Kijewski, CEO of The Shadowserver Foundation, discusses the organization’s mission to enhance internet security by exposing vulnerabilities, malicious activity, and emerging threats. Kijewski explains the.....»»
Preparing for Q-day: The essential role of cloud migration in securing enterprise data
As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This looming turning point—when quantum machines can break traditional encryption with ease—has the potential to u.....»»
Microsoft reiterates “non-negotiable” TPM 2.0 requirement for Windows 11
Microsoft won't lower Windows 11's requirements to save older Windows 10 PCs. For most people, Windows 10 security updates are slated to stop on October 14, 2025, just over 10 mon.....»»
US recommends encrypted messaging as Chinese hackers linger in telecom networks
US official: "Impossible for us to predict when we'll have full eviction." A US government security official urged Americans to use encrypted messaging as major telecom companies.....»»
Recycling sewage is a sensible way to improve water security, but would you swallow it?
Our water supply is far from infinite. According to the UN, nearly 1.8 billion people are projected to live in areas with absolute water scarcity by 2025, and two-thirds of the world's population could be living under water-stressed conditions......»»
Scan your iPhone for Pegasus spyware using a $1 app
A newly-released app lets you regularly scan your iPhone for Pegasus spyware – which can access almost all the data on a phone – for a one-off cost of just one dollar. A mobile security firm created the app, which allows you to scan your iPho.....»»
ESA workers face a maze of non-compete clauses and service contracts
Contracts limit mobility and career advancement, and ESA policy limits local laws. A system of non-competition clauses enforced by the European Space Agency’s (ESA) workforce su.....»»
Product showcase: Securing Active Directory passwords with Specops Password Policy
Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a strong and unique password, significantly reducing the risk of unauthorized access and data breaches. These policies not on.....»»