Overcoming GenAI challenges in healthcare cybersecurity
In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in the.....»»
SAFE X equips CISOs with integrated data from all their existing cybersecurity products
Safe Security launched SAFE X, a generative AI-powered mobile app for CISOs. SAFE X delivers CISOs real-time business impact insights into their cybersecurity posture, enabling better decision-making and risk prioritization. CISOs often invest millio.....»»
Cybersecurity hiring slows, pros’ stress levels rise
66% of cybersecurity professionals say their role is more stressful now than it was five years ago, according to ISACA. Major contributors to rising stress levels among cybersecurity professionals According to the data, the top reasons for increased.....»»
Cybersecurity jobs available right now: October 2, 2024
Applied Cybersecurity Engineer (Center for Securing the Homeland) MITRE | USA | Hybrid – View job details As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure.....»»
Daily 5 report for Oct. 1: Port strike again challenges an industry that must move the metal
Labor strife, railroad disruptions, weather disasters and pandemics have become business as usual for automakers......»»
Cybersecurity teams struggling to keep up with growing threat levels
Cybersecurity teams report struggling with the pressures and stress of increased cyber attacks.....»»
CDK wins DMS contract extension with Sonic Automotive
The contract extension with Sonic is a win for market leader CDK, which faced challenges over the summer after two cyberattacks......»»
Could APIs be the undoing of AI?
Application programming interfaces (APIs) are essential to how generative AI (GenAI) functions with agents (e.g., calling upon them for data). But the combination of API and LLM issues coupled with rapid rollouts is likely to see numerous organizatio.....»»
The most common authentication method is also the least secure
Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including the ex.....»»
Addressing global water security challenges: New study reveals investment opportunities and readiness levels
Water scarcity, pollution, and the burden of waterborne diseases are urgent issues threatening global health and security. A recently published study in the journal Global Environmental Change highlights the pressing need for innovative economic stra.....»»
Active Directory compromise: Cybersecurity agencies provide guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
Developing an effective cyberwarfare response plan
In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’ scale and sophistication. Izrael emphasizes the need for AI-powered defenses and proactive cybersecurity strat.....»»
September, Q3 sales impacted by ‘calendar quirk," affordability challenges
Analysts observe no new momentum in the quarter and a mostly lackluster sales pace......»»
Rethinking privacy: A tech expert’s perspective
Data privacy has become one of the most pressing challenges of our time, but it didn’t happen overnight. The proliferation of data collection, coupled with the rise of advanced technologies like artificial intelligence and machine learning, has.....»»
Compliance management strategies for protecting data in complex regulatory environments
In this Help Net Security interview, Andrius Buinovskis, Head of Product at NordLayer, discusses how organizations can assess their compliance management and ensure they meet regulatory requirements. Buinovskis also addresses the challenges of managi.....»»
New MIT protocol protects sensitive data during cloud-based computation
Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often require powerful cloud-based servers. This dependency on cloud computing rai.....»»
Active Directory compromise: Cybersecurity agencies provde guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
New report recommends specialist support to mothers in prison
A new report reveals the challenges mothers face trying to maintain a relationship with their children while in prison, and recommends additional support......»»
Evaluating embedded vulnerabilities and cybersecurity risks in procurement
Evaluating embedded vulnerabilities and cybersecurity risks in procurement.....»»
How cyber compliance helps minimize the risk of ransomware infections
Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats,.....»»
Future-proofing cybersecurity: Why talent development is key
In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent n.....»»