Introducing the book: Cybersecurity First Principles
In this Help Net Security video interview, Rick Howard, CSO of N2K, Chief Analyst, and Senior Fellow at the Cyberwire, discusses his book – Cybersecurity First Principles: A Reboot of Strategy and Tactics. In the book, Howard challenges the con.....»»
Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-24955 – a code injection vulnerability that allows authenticated attackers to execute code remotely on a vulnerable Microsoft SharePoint Server – to its KEV ca.....»»
Cybersecurity essentials during M&A surge
The volume of mergers and acquisitions has surged significantly this quarter. Data from Dealogic shows a 130% increase in US M&A activity, totaling $288 billion. Worldwide M&A has also seen a substantial uptick, rising by 56% to $453 billion. Conside.....»»
Cybersecurity jobs available right now: March 27, 2024
Cyber Product Owner UBS | Israel | On-site – View job details Your primary responsibilities will include owning and managing application security testing products, collaborating with the cyber hygiene operational team, and understandi.....»»
How threat intelligence data maximizes business operations
Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives o.....»»
Strengthening critical infrastructure cybersecurity is a balancing act
In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience agains.....»»
Reinforcement learning is the path forward for AI integration into cybersecurity
AI’s algorithms and machine learning can cull through immense volumes of data efficiently and in a relatively short amount of time. This is instrumental to helping network defenders sift through a never-ending supply of alerts and identify those th.....»»
Introducing safety and security civilization: A new paradigm for global safety science
Safety science literature and terminology reveal a limited array of concepts to describe the comprehensive characteristics of system safety and security, including terms such as safety culture and risk. Despite these efforts, the rapid evolution of s.....»»
Apple"s big WWDC 2024 announcement may be an AI App Store
Apple's AI strategy may not necessarily be to only offer the best AI apps it can produce, but instead deliver an enhanced AI App Store that may debut at WWDC.Apple AIApple, like many other tech companies, is hard at work introducing AI elements to it.....»»
20 essential open-source cybersecurity tools that save you time
Open-source software’s adaptive nature ensures its durability, relevance, and compatibility with new technologies. When I started digging deeper into the open-source cybersecurity ecosystem, I discovered an engaged community of developers worki.....»»
8 cybersecurity predictions shaping the future of cyber defense
Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI (GenAI). Two-thirds of global 100 organizations are expected to.....»»
Using physics principles to understand how cells self-sort in development
Erin McCarthy '23, physics summa cum laude, is a rarity among young scientists. As an undergraduate researcher in Syracuse University's College of Arts & Sciences' Department of Physics, she guided a study that appeared in March 2024 in Physical Revi.....»»
How do you teach young children about complex issues? New research suggests "read-alouds"
For many educators today, introducing race into curricula is a fraught proposition. So how do teachers—tasked with new learning imperatives—even begin to introduce the subject to young children?.....»»
Apple has effectively abandoned HomeKit Secure Routers
Apple's HomeKit Secure Routers were announced in 2019 but never really taken up by manufacturers, and now some vendors are claiming Apple is no longer pursuing the technology.Craig Federighi introducing HomeKit Secure Routers at WWDC 2019HomeKit Secu.....»»
CISA: Here’s how you can foil DDoS attacks
In light of the rise of “DDoS hacktivism” and the recent DDoS attacks aimed at disrupting French and Alabama government websites, the Cybersecurity and Infrastructure Security Agency (CISA) has updated its guidance of how governmental ent.....»»
Shadow AI is the latest cybersecurity threat you need to prepare for
Shadow IT – the use of software, hardware, systems and services that haven’t been approved by an organization’s IT/IT Sec departments – has been a problem for the last couple of decades, and a difficult area for IT leaders to manage effective.....»»
Ex-Secret Service agent and convicted hacker share stage at GISEC Global
A former United States Secret Service Agent and a Vietnamese former-hacker-turned-cybersecurity-specialist are set to reunite for the first time at GISEC Global 2024 to discuss their unique cat-and-mouse-style chase, which ultimately resulted in an a.....»»
Inside the book – See Yourself in Cyber: Security Careers Beyond Hacking
In this Help Net Security video, Ed Adams, president and CEO of Security Innovation, discusses his new book See Yourself in Cyber: Security Careers Beyond Hacking. The book, published by Wiley, explores the breadth and depth of cybersecurity careers......»»
Everything coming to Netflix in April 2024
The thriller series Ripley, the comic book adaptation Dead Boy Detectives, and the drama Scoop all highlight Netflix's April 2024 schedule......»»
Ivanti fixes RCE vulnerability reported by NATO cybersecurity researchers (CVE-2023-41724)
Ivanti has fixed a critical RCE vulnerability (CVE-2023-41724) in Ivanti Standalone Sentry that has been reported by researchers with the NATO Cyber Security Centre. Though the company is not aware of customers being compromised via the flaw, it R.....»»
Breed differences in dog behavior: New book
Animal and veterinary science researchers and students, as well as veterinary practitioners and animal behaviorists, will not want to miss a new book published by CABI which explores the wonders of breed differences in dog behavior......»»