Striking the balance between cybersecurity and operational efficiency
In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their cybersecurity journey and stresse.....»»
CISOs need to consider the personal risks associated with their role
70% of cybersecurity leaders felt that stories of CISOs being held personally liable for cybersecurity incidents have negatively affected their opinion of the role, according to BlackFog. 34% believed that the trend of individuals being prosecuted fo.....»»
We must adjust expectations for the CISO role
Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely int.....»»
Krispy Kreme cybersecurity incident disrupts online ordering
Popular US doughnut chain Krispy Kreme has been having trouble with its online ordering system as well as digital payments at their brick-and-mortar shops since late November, and now we finally know why: an 8-K report filed with the US Securities an.....»»
Only Cynet delivers 100% protection and detection visibility in the 2024 MITRE ATT&CK Evaluation
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, it’s vital to understand.....»»
Mosquito genetics may explain why Zika virus outbreaks are rare in Africa: Climate change could shift the balance
A study reveals that Africa's low rates of Zika virus outbreaks may be due to a surprising factor: the genetic makeup of local mosquito populations......»»
Cato Networks extends SASE-based protection to IoT/OT environments
With the introduction of Cato IoT/OT Security, Cato Networks is enabling enterprises to simplify the management and security of Internet of Things (IoT) and operational technology (OT) devices. Cato IoT/OT Security converges device discovery and clas.....»»
BadRAM: $10 hack unlocks AMD encrypted memory
Cybersecurity researchers have identified a vulnerability (CVE-2024-21944, aka BadRAM) affecting ADM processors that can be triggered by rogue memory modules to unlock the chips’ encrypted memory. The SPD chip can be modified using an off-the-s.....»»
US moves to save once-common monarch butterflies from extinction
The United States is moving to grant federal protection to the monarch butterfly—a once-common species recognizable by its striking black and orange patterns that has faced a dramatic population decline in recent decades......»»
Containers have 600+ vulnerabilities on average
Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are struggling to get container security right. Issues from misconfigured clouds, containers, and networks to.....»»
Two key proteins boost tomato"s phosphorus efficiency and plant health
Phosphorus is a critical nutrient for plant growth, yet it is often locked away in soils and inaccessible to plants. The natural process of arbuscular mycorrhizal symbiosis (AMS), in which plants exchange carbon for essential nutrients with fungi, is.....»»
US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks
The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide. Many of the victims were U.....»»
AI company trolls San Francisco with billboards saying “stop hiring humans”
Company boasts "AI workers" that never complain about work-life balance. Since the dawn of the generative AI era a few years ago, the march of technology—toward what tech compan.....»»
Chandra sees black hole jet stumble into something in the dark
Even matter ejected by black holes can run into objects in the dark. Using NASA's Chandra X-ray Observatory, astronomers have found an unusual mark from a giant black hole's powerful jet striking an unidentified object in its path......»»
This cybersecurity disaster made Google’s top 10 searches of 2024
Google Year in Search 2024 list included the calamitous CrowdStrike incident that led to the largest IT outage ever......»»
Efficiency, power, luxury: The 2025 Lucid Gravity SUV nails all three
Understanding the gravity of the situation: driving Lucid's serious new SUV. The Lucid Air sedan's base Pure trim can manage 420 miles (676 km) of EPA-estimated range from just an.....»»
Strengthening security posture with comprehensive cybersecurity assessments
In this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools and methodologies, the role of AI and automation, and strategies for aligning assessments with organizationa.....»»
Cybersecurity jobs available right now: December 10, 2024
Cloud Security Engineer Sendbird | USA | Hybrid – View job details As a Cloud Security Engineer, you will work with engineering teams to build secure infrastructure at scale, secure multi-account and multi-cloud infrastructure for Sen.....»»
Top cybersecurity books for your holiday gift list
The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book can provide both knowledge and inspiration. To help with ideas on what to give, we’ve compiled a list of c.....»»
What makes for a fulfilled cybersecurity career
In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a fulfi.....»»
A new global carbon trading market could be held hostage by speculators
Our planet's future hangs in the balance due to the unabated greenhouse gas emissions from burning fossil fuels. Treating these emissions as something that can be owned and exchanged in a market has been touted as a solution since the early 1990s, wh.....»»