Top 7 factors boosting enterprise cybersecurity resilience
Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to the latest edition of Cisco’s annual Security Outcomes Report. The survey findings are based on survey respons.....»»
The key pillars of domain security
From branded emails and marketing campaigns to critical protocols, internal portals, and internet traffic, domains are central to digital enterprise operations. They are constantly created for new assets and initiatives. In this Help Net Security vid.....»»
Boeing says it will cut SLS workforce “due to external factors”
"Boeing is reviewing and adjusting current staffing levels." Enlarge / The SLS rocket is seen on its launch pad at Kennedy Space Center in August 2022. (credit: Trevor Mahlmann) On Thursday senior Boeing officials leadin.....»»
The importance of the Vulnerability Operations Centre for cybersecurity
The importance of the Vulnerability Operations Centre for cybersecurity.....»»
Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)
The newest version of Ivanti Avalanche – the company’s enterprise mobile device management (MDM) solution – carries fixes for 27 vulnerabilities, two of which (CVE-2024-29204, CVE-2024-24996) are critical and may allow a remote unau.....»»
Redgate Monitor Enterprise prevents unauthorized access to sensitive information
Redgate has launched an enterprise version of its popular database monitoring tool, providing a range of new features to address the challenges of scale and complexity faced by larger organizations. Redgate Monitor Enterprise offers advanced capabili.....»»
Enterprises face significant losses from mobile fraud
A recent Enea survey highlights a worrying trend in enterprise security: Following ChatGPT’s launch, 76% of businesses are inadequately protected against rising AI-driven vishing and smishing threats. In this Help Net Security video, John Hughe.....»»
92% of enterprises unprepared for AI security challenges
Most industries continue to run almost two or more months behind in patching software vulnerabilities, endpoints remain vulnerable to threats, and most enterprise PCs must be replaced to support AI-based technologies, according to the Absolute Securi.....»»
EU cybersecurity label for cloud computing vote pushed back once again
Cloud service security label will hopefully guarantee EU data safety, but regulatory erosion is putting security at risk......»»
Cybersecurity jobs available right now: April 17, 2024
Client Security Officer Unisys | USA | Remote – View job details The Client Security Officer (CSO) is part of Unisys account management team servicing its clients as cybersecurity representative alongside the Client Executive and the.....»»
Uranium-immobilizing bacteria in clay rock: Exploring how microorganisms can influence the behavior of radioactive waste
When designing repositories for high-level radioactive waste in deep geological layers, various factors must be carefully considered to ensure their long-term safety. Among other things, natural communities of microorganisms can influence the behavio.....»»
Why the US government’s overreliance on Microsoft is a big problem
Microsoft continues to get a free pass after series of cybersecurity failures. Enlarge (credit: Joan Cros via Getty) When Microsoft revealed in January that foreign government hackers had once again breached its systems,.....»»
Sectigo SCM Pro automates certificate management
Sectigo launched SCM Pro, a solution to bring the robustness of enterprise CLM to Small and midsize enterprises (SMEs), effectively leveling the playing field between large enterprises and the mid-market. Online identity proliferation, hybrid work, a.....»»
GuidePoint Security introduces IoT Security Assessment
GuidePoint Security announced its IoT Security Assessment, a new cybersecurity service. GuidePoint Security’s team of IoT security and embedded systems experts have extensive experience identifying potential weaknesses in IoT devices and applicatio.....»»
5 free red teaming resources to get you started
Red teaming is evaluating the effectiveness of your cybersecurity by eliminating defender bias and adopting an adversarial perspective within your organization. Tactics may include anything from social engineering to physical security breaches to sim.....»»
AI set to enhance cybersecurity roles, not replace them
In this Help Net Security interview, Caleb Sima, Chair of CSA AI Security Alliance, discusses how AI empowers security pros, emphasizing its role in enhancing skills and productivity rather than replacing staff. AI is seen as empowering rather than r.....»»
Bumblebees don"t care about pesticide cocktails: Research highlights their resilience to chemical stressors
Bumblebees appear to be quite resistant to common pesticides. This is shown by a new study, the results of which have now been published by scientists from Julius-Maximilians-Universität Würzburg (JMU) in the journal Environment International......»»
Lessons from South Australia"s business recovery amidst bushfires and pandemic
New research has given insight into the resilience and recovery of businesses in two South Australian regions following a major bushfire event and disruptions caused by the COVID-19 pandemic......»»
eBook: Why CISSP?
As new cyber threats emerge daily in our connected world, there’s never been a greater urgency for cybersecurity professionals than now. What can CISSP certification do for you? In the eBook, hear from cybersecurity experts on how certification: Gi.....»»
NASA discovered bacteria that wouldn"t die. Now it"s boosting sunscreen.
While disinfecting spacecraft headed for Mars, NASA found a stubborn type of bacteria that was tough to clean but great at withstanding UV radiation. Many people associate NASA with exploring new worlds in space, but few know it's also finding.....»»
Expand your library with these cybersecurity books
In this Help Net Security video round-up, authors discuss their cybersecurity books and provide an inside look at each title. Complete videos George Finney, CSO at Southern Methodist University, talks about his book – “Project Zero Trust: A Story.....»»