NIS2 Directive raises stakes for security leaders
In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations of the NIS2 Directive, aiming to standardize cybersecurity practices across sectors. NIS2 mandates minimal cyberse.....»»
iOS 17.5 includes these 15 security patches for iPhone users
iOS 17.5 has landed for everyone with several new user-facing features. And there are also 15 important security fixes that come with the update. Here are the full details on everything that’s been patched. more….....»»
Black Basta ransomware group is imperiling critical infrastructure, groups warn
Threat group has targeted 500 organizations. One is currently struggling to cope. Enlarge (credit: Getty Images) Federal agencies, health care associations, and security researchers are warning that a ransomware group tr.....»»
Biden administration eases rules on battery minerals as reports say it prepares to boost EV tariffs
Conflicting policy moves reflect dependence on China's supply chain and concerns about subsidies and national security.....»»
MITRE EMB3D improves security for embedded devices
MITRE released EMB3D, a cybersecurity threat model for embedded devices. The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to m.....»»
Securing the future through cybersecurity education
In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about the cybersecurity talent shortage and the role STEM education can play in solving that problem. They also discuss actions nee.....»»
How AI affects vulnerability management in open-source software
In this Help Net Security video, Itamar Sher, CEO of Seal Security, discusses how AI affects the risk and operational aspects of managing vulnerabilities in open-source software. One of the core issues around open-source vulnerability patch managemen.....»»
AI’s rapid growth puts pressure on CISOs to adapt to new security risks
The increased use of AI further complicates CISO role as industries begin to realize the full potential of GenAI and its impact on cybersecurity, according to Trellix. GenAI’s impact on CISO responsibility GenAI has rolled out at an immense spe.....»»
Establishing a security baseline for open source projects
In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) and opportunities for overcoming these challenges. The OpenSSF community has.....»»
Security Bite: Apple updates Platform Security guide with first-ever details on App Store security, BlastDoor, more
Apple this week updated its Platform Security guide, which contains in-depth technical information on security features implemented in its products. First released in 2015, the latest update adds six new topics, including first-ever details on BlastD.....»»
Get this Awesome Deal on Blink’s 4th Gen Cam with $120 Off!
This offer packs three cameras into one bundle. The post Get this Awesome Deal on Blink’s 4th Gen Cam with $120 Off! appeared first on Phandroid. For buyers after a reliable home surveillance and security solution, Blink’s wide.....»»
New infosec products of the week: May 10, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, AuditBoard, Cranium, Datadog, Eclypsium, ExtraHop, Forcepoint, SentinelOne, Splunk, Sumo Logic, and Trellix. AuditBoard enhances InfoSec S.....»»
GenAI enables cybersecurity leaders to hire more entry-level talent
93% of security leaders said public GenAI was in use across their respective organizations, and 91% reported using GenAI specifically for cybersecurity operations, according to Splunk. A total of 1,650 security leaders participated in the global surv.....»»
Nmap 7.95 released: New OS and service detection signatures
Nmap is a free, open-source tool for network discovery and security auditing. It’s valued by systems and network administrators for network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap identifies av.....»»
How secure is the “Password Protection” on your files and drives?
People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. However, simple password protection on a PDF or Exc.....»»
Ford hires former Lucid exec Sherry House as incoming CFO
Ford is promoting CFO John Lawler to vice chair, focusing on strategic development, global partnerships and engagement with global leaders......»»
Iceland"s "Mammoth" raises potential for carbon capture
With Mammoth's 72 industrial fans, Swiss start-up Climeworks intends to suck 36,000 tonnes of CO2 from the air annually to bury underground, vying to prove the technology has a place in the fight against global warming......»»
Study finds not all failures lead to learning
Do people learn from their failures? In a new study, researchers have examined the high-stakes field of cardiothoracic surgery to assess the relationship between individuals' experiences with failures and the learning outcomes associated with them. T.....»»
Security flaws in BIG-IP system could have put entire networks at risk
F5 released mitigations and a patch for two high-risk flaws......»»
GM logistics supplier Proficient Auto raises $215 million in IPO
The company, which transports finished vehicles from manufacturers and shipping ports to auto dealerships, provides services to GM, Stellantis, Toyota and other automakers......»»
U.S. agency raises safety concerns on Ford crossover fuel leak recall
The National Highway Traffic Safety Administration (NHTSA) said last month it was investigating the adequacy and safety consequences of Ford's proposed recall remedy for 2022-2023 model year Bronco Sport and 2022 Ford Escape SUVs with 1.5L engines......»»