Setting a security standard: From vulnerability to exposure management
Vulnerability management has been the standard approach to fending off cyber threats for years. Still, it falls short by focusing on a limited number of vulnerabilities, often resolving only 1% to 20% of issues. In 2024, with the average data breach.....»»
Businesses plagued by constant stream of malicious emails
36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – and.....»»
What makes for a fulfilled cybersecurity career
In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a fulfi.....»»
Who handles what? Common misconceptions about SaaS security responsibilities
In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common.....»»
Indie App Spotlight: ‘Griply’ is an all-in-one planner for goal setting, task management, and habit tracking
Welcome to Indie App Spotlight. This is a weekly 9to5Mac series where we showcase the latest apps in the indie app world. If you’re a developer and would like your app featured, get in contact. Griply is an all-in-one app that brings toget.....»»
While we"re quick to limit kids" screen time, parents can also benefit from setting boundaries for themselves
In many households, screens are part of daily life—from work to entertainment......»»
World"s oldest known wild bird is expecting again, aged 74
Parenting can be tough, even for the young and energetic, but one elderly albatross is about to go through it all again—at the ripe old (and apparently record-setting) age of 74......»»
Digital twin model enables precise simulation of forest landscapes, depicting a forest in 100 years
Forest ecosystems of the future will have to cope with very different conditions to those of today. For this reason, researchers at the Technical University of Munich (TUM) state that a strategic approach to forest management is crucial. To this end,.....»»
Resecurity introduces AI-powered GSOC at NATO Edge 2024
Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and Information Agency’s flagship conference. This year’s event, held from D.....»»
Echoworx enhances secure access to encrypted messages
Echoworx announced the addition of 2-Step Verification (2SV) when using OAuth and Passkeys for authentication for encrypted messages. This latest enhancement offers organizations an additional layer of security, addressing the growing demand for iden.....»»
How to choose secure, verifiable technologies?
The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring.....»»
New infosec products of the week: December 6, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Datadog, Fortinet, Radiant Logic, Sweet Security, Tenable, and Veza. FortiAppSec Cloud simplifies web application security management With FortiAppSec Cloud,.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Building a robust security posture with limited resources
In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by legacy systems, and build defenses for startups. Lindahl-Wise also highlights.....»»
UN report: Invest in nature to cut billion-dollar costs of droughts
As droughts fueled by human destruction of the environment are projected to affect 3 in 4 people by 2050, investing in sustainable land and water management is essential to reduce their costs, which already exceed $307 billion per year globally, acco.....»»
Providing performance information of peers is effective management tool if done in correct setting, study finds
More and more companies are gathering performance data on their employees and sharing that data among their staff. Their hope: that those employees who receive feedback that their own performance is lower than their colleagues' will be more motivated.....»»
Could we use an asteroid to shield astronauts on their way to Mars?
Radiation is a primary concern for long-duration human spaceflight, such as the planned trips to Mars, which are the stated goal of organizations such as NASA and SpaceX. Shielding is the standard way to protect astronauts from radiation during those.....»»
Mitel MiCollab zero-day and PoC exploit unveiled
A zero-day vulnerability in the Mitel MiCollab enterprise collaboration suite can be exploited to read files containing sensitive data, watchTowr researcher Sonny Macdonald has disclosed, and followed up by releasing a proof-of-concept (PoC) exploit.....»»
Download: The Ultimate Guide to the CCSP
Even the brightest minds benefit from guidance on the journey to success. The Ultimate Guide to the CCSP covers everything you need to know about the world’s leading cloud security certification. Learn how CCSP – and ISC2 – can help you discove.....»»
8 US telcos compromised, FBI advises Americans to use encrypted communications
FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the networks a.....»»
Tenable Patch Management prevents problematic updates
Tenable released Tenable Patch Management, an autonomous patch solution built to close vulnerability exposures in a unified solution. A strategic partnership and integration with Adaptiva provides the foundation of the solution. Vulnerability remedia.....»»