Advertisements


How to combat alert fatigue in cybersecurity

In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in cybersecurity and DevOps environments. Alert fatigue results from the overwhelming volume of event data generated by security t.....»»

Category: securitySource:  netsecurityMay 28th, 2024

The critical role of IT staffing in strengthening cybersecurity

Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions. It involves the right staff with the unique expertise necessary to recognize and prevent potential.....»»

Category: securitySource:  netsecurityRelated NewsMay 16th, 2024

Cybersecurity analysis exposes high-risk assets in power and healthcare sectors

Traditional approaches to vulnerability management result in a narrow focus of the enterprise attack surface area that overlooks a considerable amount of risk, according to Claroty. Organizations must take a holistic approach to exposure management T.....»»

Category: securitySource:  netsecurityRelated NewsMay 15th, 2024

Cybersecurity jobs available right now: May 15, 2024

Associate / Pentester (Red Team) – Cybersecurity Audit Siemens | Germany | Hybrid – View job details As an Associate / Pentester (Red Team) – Cybersecurity Audit, you will be responsible for conducting cybersecurity assess.....»»

Category: securitySource:  netsecurityRelated NewsMay 15th, 2024

Apple backports iOS zero-day patch, adds Bluetooth tracker alert

Apple has backported the patch for CVE-2024-23296 to the iOS 16 branch and has fixed a bug (CVE-2024-27852) in MarketplaceKit that may allow maliciously crafted webpages to distribute a script that tracks iOS users on other webpages. The company has.....»»

Category: securitySource:  netsecurityRelated NewsMay 14th, 2024

Scientists develop sticky pesticide to combat pest insects

Researchers from Wageningen University & Research (WUR) and Leiden University have engineered a biological barrier that protects plants from diseases and pests. It concerns a sticky substance that is sprayed on leaves, to which pests stick......»»

Category: topSource:  informationweekRelated NewsMay 14th, 2024

Are you meeting your cyber insurance requirements?

Cyber insurance policies are specifically designed to offer financial protection to organizations in the face of cyber attacks, data breaches, or other cybersecurity incidents. While they can provide a sense of security, it’s crucial to be awar.....»»

Category: securitySource:  netsecurityRelated NewsMay 14th, 2024

MITRE EMB3D improves security for embedded devices

MITRE released EMB3D, a cybersecurity threat model for embedded devices. The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to m.....»»

Category: securitySource:  netsecurityRelated NewsMay 13th, 2024

Securing the future through cybersecurity education

In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about the cybersecurity talent shortage and the role STEM education can play in solving that problem. They also discuss actions nee.....»»

Category: securitySource:  netsecurityRelated NewsMay 13th, 2024

AI’s rapid growth puts pressure on CISOs to adapt to new security risks

The increased use of AI further complicates CISO role as industries begin to realize the full potential of GenAI and its impact on cybersecurity, according to Trellix. GenAI’s impact on CISO responsibility GenAI has rolled out at an immense spe.....»»

Category: securitySource:  netsecurityRelated NewsMay 13th, 2024

GenAI enables cybersecurity leaders to hire more entry-level talent

93% of security leaders said public GenAI was in use across their respective organizations, and 91% reported using GenAI specifically for cybersecurity operations, according to Splunk. A total of 1,650 security leaders participated in the global surv.....»»

Category: securitySource:  netsecurityRelated NewsMay 11th, 2024

CISA starts CVE “vulnrichment” program

The US Cybersecurity and Infrastructure Agency (CISA) has announced the creation of “Vulnrichment,” a new project that aims to fill the CVE enrichment gap created by NIST National Vulnerability Database’s recent slowdown. NVD is fai.....»»

Category: securitySource:  netsecurityRelated NewsMay 9th, 2024

AuditBoard enhances InfoSec Solutions to reduce compliance fatigue across the organization

AuditBoard announced powerful enhancements for its InfoSec Solutions to help organizations meet their IT compliance, cyber risk, and vendor risk management needs in the face of rising risks and increased regulatory requirements. With these new capabi.....»»

Category: securitySource:  netsecurityRelated NewsMay 9th, 2024

Regulators are coming for IoT device security

Cybersecurity is a relatively new challenge for many IoT device makers who have traditionally produced non-connected devices. These devices were less vulnerable to exploitation and, as a result, manufacturers often lack the expertise and experience n.....»»

Category: securitySource:  netsecurityRelated NewsMay 9th, 2024

Why SMBs are facing significant security, business risks

In this Help Net Security video, Alex Cox, Director of Threat Intelligence at LastPass, discusses how human factors are getting in the way while SMB leaders report investing more time, attention, and budget in cybersecurity. According to LastPass, th.....»»

Category: securitySource:  netsecurityRelated NewsMay 9th, 2024

3 CIS resources to help you drive your cloud cybersecurity

In the process of moving to the cloud, you need a security-first cloud migration strategy that considers both your security and compliance requirements upfront. In this article, we’ll discuss how you can use resources from the Center for Internet S.....»»

Category: securitySource:  netsecurityRelated NewsMay 9th, 2024

Bike brands start to adopt C-V2X to warn cyclists about cars

More automakers will need to adopt C-V2X to see a real benefit, though. Enlarge / A C-V2X bicycle can alert a C-V2X-enabled car to its presence—note the large yellow icon on the screenshot of the Audi's digital instrument displ.....»»

Category: topSource:  arstechnicaRelated NewsMay 8th, 2024

Researchers target spermidine production to combat emerging drug resistance in Salmonella

Food-borne diseases like typhoid, caused by Salmonella Typhimurium, are a severe threat to public health, especially in India. The indiscriminate use of antibiotics has allowed this bacterium to become resistant, posing a major hurdle in treating inf.....»»

Category: topSource:  physorgRelated NewsMay 8th, 2024

CyberSaint releases NIST CSF Benchmarking Feature

CyberSaint released the NIST Cybersecurity Framework (CSF) Benchmarking Feature, which allows CISOs and security teams to measure their NIST posture against industry peers through a historical maturity graph on the CyberStrong Executive Dashboard. Or.....»»

Category: securitySource:  netsecurityRelated NewsMay 8th, 2024

Traceable launches Generative AI API Security to combat AI integration risks

Traceable AI has revealed an Early Access Program for its new Generative AI API Security capabilities. As enterprises increasingly integrate Generative AI such as Large Language Models (LLMs) into critical applications, they expose those applications.....»»

Category: securitySource:  netsecurityRelated NewsMay 8th, 2024

ExtraHop releases AI tools to automate SOC workflows

ExtraHop has revealed a set of AI tools in the RevealX platform designed to automate SOC workflows and relieve analyst fatigue. Against the backdrop of a rapidly expanding threat landscape and alert overload, SOC analysts are increasingly overworked.....»»

Category: securitySource:  netsecurityRelated NewsMay 8th, 2024