Overcoming the cybersecurity talent shortage with upskilling initiatives
In this Help Net Security interview, Dr. Lindsey Polley de Lopez, Director of Cyber & Space Intelligence at MACH37, proposes strategies for companies, educational institutions, and governments on how to address the ongoing shortage of cybersecurity t.....»»
Active Directory compromise: Cybersecurity agencies provide guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
Developing an effective cyberwarfare response plan
In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’ scale and sophistication. Izrael emphasizes the need for AI-powered defenses and proactive cybersecurity strat.....»»
Toyota deflects attack by anti-DEI activist over LGBTQ programs
Toyota Motor Corp. distanced itself from some of its LGBTQ initiatives and said it doesn’t have a quota system to boost diversity among its suppliers.....»»
Active Directory compromise: Cybersecurity agencies provde guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
Auto companies struggle to recruit and keep software, tech talent
Outdated HR and hiring structures hinder the EV transition as competition for digital talent intensifies, according to Josh Bersin Co......»»
Small firms may offer higher pay due to a lack of market power
Small companies may post higher wages for entry level positions than large companies—potentially attracting better talent, even though the larger companies have more influence on the market, according to new Cornell research......»»
Ford CEO: Being kind not ‘natural to me"
Ford's CEO, at a dinner honoring the 2024 Automotive News Rising Stars, gave advice on identifying talent, managing time and improving himself......»»
Six initiatives for prioritizing undergraduate student well-being
In a perspective, Holly C. White and colleagues argue that student well-being should be a goal of pedagogy, along with traditional metrics such as GPA and student retention. Despite evidence linking certain academic experiences with well-being outcom.....»»
Increasing protein in staple crops could help alleviate global protein shortage
A Mississippi State biologist's research in improving global nutrition and sustainability is featured this week in New Phytologist......»»
Evaluating embedded vulnerabilities and cybersecurity risks in procurement
Evaluating embedded vulnerabilities and cybersecurity risks in procurement.....»»
How cyber compliance helps minimize the risk of ransomware infections
Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats,.....»»
Future-proofing cybersecurity: Why talent development is key
In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent n.....»»
MFA bypass becomes a critical security issue as ransomware tactics advance
Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the past 12 months – a jump from 61% in 2023, according to SpyCloud. Session hijacking surges as ma.....»»
U.S. proposes ban on Chinese vehicle software
Pending restrictions stem from an investigation of cybersecurity risks from Chinese vehicle software that President Joe Biden launched in March......»»
Organizations are changing cybersecurity providers in wake of Crowdstrike outage
More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers......»»
U.S. readies ban on Chinese vehicle software
Pending restrictions stem from an investigation of cybersecurity risks from Chinese vehicle software that President Joe Biden launched in March......»»
Lucid eyes Detroit engineering talent ahead of EV launches, powertrain supply agreements
Lucid Motors opened a hub near Detroit to attract vehicle engineers. It also wants to provide its powertrain tech to more automakers......»»
Striking the balance between cybersecurity and operational efficiency
In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their cybersecurity journey and stresse.....»»
Essential metrics for effective security program assessment
In this Help Net Security interview, Alex Spivakovsky, VP of Research & Cybersecurity at Pentera, discusses essential metrics for evaluating the success of security programs. Spivakovsky explains how automation and proactive testing can reveal vulner.....»»
Side effects of wide-scale forestation could reduce water availability by 15% in vulnerable regions
The side effects of large-scale forestation initiatives could have serious consequences for water availability, a pioneering study has found......»»