Advertisements


Key cybersecurity skills gap statistics you should be aware of

As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in.....»»

Category: securitySource:  netsecurityJan 2nd, 2024

Australian gold mining company hit with ransomware

Australian gold mining firm Evolution Mining has announced on Monday that it became aware on 8 August 2024 of a ransomware attack impacting its IT systems, and has been working with its external cyber forensic experts to investigate the incident. .....»»

Category: securitySource:  netsecurityRelated NewsAug 13th, 2024

Redefining the computer whiz: Research shows diverse skills valued by youth

New study reveals diverse perceptions of the "ideal" computer science student among young people......»»

Category: topSource:  physorgRelated NewsAug 11th, 2024

Week in review: Tips for starting your cybersecurity career, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: August 2024 Patch Tuesday forecast: Looking for a calm August release August 2024 July ended up being more ‘exciting’ than many of us wanted; we.....»»

Category: securitySource:  netsecurityRelated NewsAug 11th, 2024

Veterinarian says owners should be aware of the risks of letting their dogs drink from public water sources

When taking your dog for a walk during the scorching summer heat, it may be tempting to allow your dog a few laps from the nearest drinking station in order to cool off. However, shared hydration sources can potentially have dire effects for your bel.....»»

Category: topSource:  physorgRelated NewsAug 9th, 2024

NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?

The Network and Information Security (NIS) 2 Directive is possibly one of the most significant pieces of cybersecurity regulation to ever hit Europe. The 27 EU Member States have until 17 October 2024 to adopt and publish the standards necessary to c.....»»

Category: securitySource:  netsecurityRelated NewsAug 9th, 2024

Photos: Black Hat USA 2024 Arsenal

At the Black Hat USA 2024 Arsenal by ToolsWatch, researchers showcase their latest cybersecurity open-source tools. Must read: 20 free cybersecurity tools you might have missed 15 open-source cybersecurity tools you’ll wish you’d known earlier 20.....»»

Category: securitySource:  netsecurityRelated NewsAug 8th, 2024

Download: CIS Critical Security Controls v8.1

Version 8.1 of the CIS Critical Security Controls (CIS Controls) is an iterative update to version 8.0. It offers prescriptive, prioritized, and simplified cybersecurity best practices that provide a clear path to improve your organization’s cyber.....»»

Category: securitySource:  netsecurityRelated NewsAug 8th, 2024

Hero AI by Swimlane enhances security with context-aware recommendations

Swimlane has introduced Hero AI innovations that transform traditional security operations, enabling security teams to tackle complex cases, alerts, and intelligence with unprecedented speed. Hero AI expands case summarization capabilities with conte.....»»

Category: securitySource:  netsecurityRelated NewsAug 6th, 2024

Resecurity to introduce Context AI, a specialized generative AI framework

Resecurity (USA), a global leader in cybersecurity and risk management solutions serving major Fortune 500 companies and government agencies, has added new AI capabilities to its flagship Platform-as-a-Service (PaaS) offering, to accelerate its propr.....»»

Category: securitySource:  netsecurityRelated NewsAug 6th, 2024

Scaling data security solutions: What you need to know

In this Help Net Security interview, Bruno Kurtic, President and CEO at Bedrock Security, discusses the role of data visibility in enhancing cybersecurity. He explains that effective data visibility involves discovering, classifying, and contextualiz.....»»

Category: securitySource:  netsecurityRelated NewsAug 6th, 2024

AppOmni unveils SaaS-aware ITDR capabilities

AppOmni announced a series of technology advances to deliver identity and threat detection (ITDR) capabilities to protect SaaS environments. The newest capabilities complement traditional ITDR and identity and access management (IAM) solutions from I.....»»

Category: securitySource:  netsecurityRelated NewsAug 5th, 2024

IBM Consulting Cybersecurity Assistant helps clients accelerate alert investigation

IBM generative AI capabilities to its managed Threat Detection and Response Services utilized by IBM Consulting analysts to advance and streamline security operations for clients. Built on IBM’s watsonx data and AI platform, the new IBM Consult.....»»

Category: securitySource:  netsecurityRelated NewsAug 5th, 2024

The role of AI in cybersecurity operations

Security operation centers (SOCs) need to be better equipped to manage the sheer scale of data to monitor and the increasing sophistication of threats. SOC analysts face a daunting task: sifting through thousands of alerts every day – most of w.....»»

Category: securitySource:  netsecurityRelated NewsAug 5th, 2024

How life sciences companies use AI to fill the cybersecurity skills gap

In this Help Net Security video, Beth Miller, Field CISO at Code42, highlights a significant trend: 73% of life sciences companies turn to AI to address the cybersecurity skills gap, surpassing adoption rates in other industries. Underresourced secur.....»»

Category: securitySource:  netsecurityRelated NewsAug 5th, 2024

MISP: Open-source threat intelligence and sharing platform

MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis. MISP is designed by and for cybersecurity, ICT professio.....»»

Category: securitySource:  netsecurityRelated NewsAug 5th, 2024

How to start your cybersecurity career: Expert tips and guidance

As businesses strive to protect their data and privacy, the demand for skilled cybersecurity professionals continues to grow. This article provides expert advice to help you navigate the early stages of your cybersecurity career, offering practical t.....»»

Category: securitySource:  netsecurityRelated NewsAug 5th, 2024

Why monitoring dark web traffic is crucial for cybersecurity teams

Why monitoring dark web traffic is crucial for cybersecurity teams.....»»

Category: topSource:  marketingvoxRelated NewsAug 2nd, 2024

Dealerships warned about phishing scams tied to global cyber event

Two cybersecurity consulting firms are warning dealerships about scams relating to CrowdStrike's catastrophic software update on July 19......»»

Category: topSource:  autonewsRelated NewsAug 1st, 2024

Why CISOs face greater personal liability

In this Help Net Security interview, Christos Tulumba, CISO at Veritas Technologies, discusses the key factors contributing to increased personal liability risks for CISOs. These risks are driven by heightened cybersecurity threats, evolving regulati.....»»

Category: securitySource:  netsecurityRelated NewsAug 1st, 2024

The climate is changing so fast that we haven’t seen how bad extreme weather could get

Decades-old statistics no longer represent what is possible in the present day. Enlarge (credit: Peter Zelei Images via Getty Images) Extreme weather is, by definition, rare on our planet. Ferocious storms, searing heatw.....»»

Category: topSource:  arstechnicaRelated NewsJul 31st, 2024