MIH to bridge EV and cybersecurity sectors, says Foxconn CTO
Cybersecurity has become an increasingly major concern for the electric vehicle (EV) sector, as cars are going smarter, and the MIH Alliance will serve as a platform for cross-industry communications and exchanges to effectively tackle cybersecurity.....»»
Global attacker median dwell time continues to fall
While the use of zero-day exploits is on the rise, Mandiant’s M-Trends 2024 report reveals a significant improvement in global cybersecurity posture: the global median dwell time – the time attackers remain undetected within a target environm.....»»
The relationship between cybersecurity and work tech innovation
As organizations navigate the complexities of hybrid work arrangements and the gradual return to the office, the cybersecurity threat landscape has become increasingly challenging, with issues such as the proliferation of personal devices, the expans.....»»
Cybersecurity jobs available right now: April 24, 2024
Blockchain Security Researcher StarkWare | Israel | On-site – View job details The Security Researcher will be responsible for conducting in-depth research and analysis on the security of blockchain systems, protocols and the infrastr.....»»
Vodafone wants to help UK SMBs get more productive than ever before
Productivity and cybersecurity products for SMEs can now be purchased directly through Vodafone’s new initiative......»»
What is multi-factor authentication (MFA), and why is it important?
Setting up MFA can seem daunting for consumers just beginning to clean up their security postures. In this Help Net Security video, Larry Kinkaid, Manager, Cybersecurity Consulting at BARR Advisory, shares tips for consumers who need simple, accessib.....»»
10 colleges and universities shaping the future of cybersecurity education
Institutions featured on this list often provide undergraduate and graduate degrees, courses, as well as certificate programs tailored to meet the growing demand for cybersecurity professionals in various industries. Some notable colleges and univers.....»»
How to improve response to emerging cybersecurity threats
Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos fea.....»»
The importance of the Vulnerability Operations Centre for cybersecurity
The importance of the Vulnerability Operations Centre for cybersecurity.....»»
Ocean environment safety of nanocellulose investigated in study of mussels
Cellulose nanofibers represent a promising resource for multiple industrial sectors, but what is their impact on the marine environment? A study published in Environmental Science: Nano recently addressed this issue in a study on marine organisms con.....»»
After decades of Mario, how do developers bridge a widening generation gap?
Tezuka: "The secret to having a long-tenured staff is that people don't quit." Enlarge / A prototype wonder effect—featuring Mario's head turned into blocks that could be eaten by enemies—didn't make it into the final game. (.....»»
EU cybersecurity label for cloud computing vote pushed back once again
Cloud service security label will hopefully guarantee EU data safety, but regulatory erosion is putting security at risk......»»
Cybersecurity jobs available right now: April 17, 2024
Client Security Officer Unisys | USA | Remote – View job details The Client Security Officer (CSO) is part of Unisys account management team servicing its clients as cybersecurity representative alongside the Client Executive and the.....»»
Why the US government’s overreliance on Microsoft is a big problem
Microsoft continues to get a free pass after series of cybersecurity failures. Enlarge (credit: Joan Cros via Getty) When Microsoft revealed in January that foreign government hackers had once again breached its systems,.....»»
Large Section of Baltimore"s Key Bridge Removed From Water
Large Section of Baltimore"s Key Bridge Removed From Water.....»»
Salvage crews race against the clock to remove massive chunks of fallen Baltimore bridge
Salvage crews race against the clock to remove massive chunks of fallen Baltimore bridge.....»»
GuidePoint Security introduces IoT Security Assessment
GuidePoint Security announced its IoT Security Assessment, a new cybersecurity service. GuidePoint Security’s team of IoT security and embedded systems experts have extensive experience identifying potential weaknesses in IoT devices and applicatio.....»»
5 free red teaming resources to get you started
Red teaming is evaluating the effectiveness of your cybersecurity by eliminating defender bias and adopting an adversarial perspective within your organization. Tactics may include anything from social engineering to physical security breaches to sim.....»»
AI set to enhance cybersecurity roles, not replace them
In this Help Net Security interview, Caleb Sima, Chair of CSA AI Security Alliance, discusses how AI empowers security pros, emphasizing its role in enhancing skills and productivity rather than replacing staff. AI is seen as empowering rather than r.....»»
eBook: Why CISSP?
As new cyber threats emerge daily in our connected world, there’s never been a greater urgency for cybersecurity professionals than now. What can CISSP certification do for you? In the eBook, hear from cybersecurity experts on how certification: Gi.....»»
Expand your library with these cybersecurity books
In this Help Net Security video round-up, authors discuss their cybersecurity books and provide an inside look at each title. Complete videos George Finney, CSO at Southern Methodist University, talks about his book – “Project Zero Trust: A Story.....»»