Want to be a CISO? Being technical is just one of the requirements
As data breaches’ financial and reputational costs continue to reach new heights, cybersecurity should be on top of mind for leadership across every industry. Recent Proofpoint research found that 65% of board members believe their organization.....»»
The first microrobots capable of navigating within groups of cells and stimulating individual cells
A group of researchers at the Technical University of Munich (TUM) has developed the world's first microrobot ("microbot") capable of navigating within groups of cells and stimulating individual cells. Berna Özkale Edelmann, a professor of Nano- and.....»»
Why end-to-end encryption matters
In this Help Net Security video, Kayne McGladrey, IEEE Senior Member and Field CISO at Hyperproof, discusses end-to-end encryption (E2EE). E2EE ensures that only two parties – a sender and a receiver – can access data, and helps to protect consum.....»»
EE and Vodafone: Technical bug hits mobile networks
The two providers have offered different accounts of what happened to their networks......»»
Ad-free Facebook subscription rumored; social networks allow Russian disinformation to grow
Meta may introduce the option of an ad-free Facebook subscription as it struggles to comply with increasingly stringent European privacy requirements, says a new report. A similar paid subscription option may also be offered to Instagram users ….....»»
The secret habits of top-performing CISOs
69% of top-performing CISOs dedicate recurring time on their calendars for personal professional development, according to Gartner. This is compared with just 36% of bottom-performing CISOs who do so. “As the CISO role continues to rapidly evolve,.....»»
How I supercharged my productivity with a free typing app
I found this free text expansion app invaluable for detailed, technical writing. It prevented mistakes while speeding up my typing......»»
Okta for Global 2000 gives CEOs flexibility to centralize or decentralize their business strategy
Okta announced Okta for Global 2000, a solution designed to give the world’s largest organizations choice in how they run their technology infrastructure with flexible and automated identity management. Okta for Global 2000 enables the technical ag.....»»
What true diversity in the cybersecurity industry looks like
In this Help Net Security video, Larry Whiteside, Jr., CISO at RegScale and President of Cyversity, discusses how, now more than ever, the cybersecurity industry needs the diversity of thought to address the increasingly complex and technology-driven.....»»
What does a job as a remote Linux administrator entail: how to become a professional, and the skills you need?
Remote Linux Administrator Jobs: Balancing Flexibility and Technical Excellence Information technology professionals can choose any field they like. In particular, the profession of remote Linux administrator is gaining popularity lately – more.....»»
Global COVID monitoring is crashing as BA.2.86 variant raises alarm
"This is on the shoulders of governments right now." Enlarge / WHO's COVID-19 technical lead, Maria Van Kerkhove, looks on during a press conference at the World Health Organization's headquarters in Geneva, on December 14, 2022......»»
How the downmarket impacted enterprise cybersecurity budgets
Belts have tightened, and that ROI and cost reduction are now driving CISO decision-making more than ever. In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how enterprise cybersecurity budgets have been impacted.....»»
The complex world of CISO responsibilities
A Chief Information Security Officer (CISO) plays a crucial role in protecting an organization’s digital assets. They are responsible for ensuring the security of sensitive information, defending against cyber threats, and maintaining data inte.....»»
Federal agencies gear up for zero trust executive order deadline
Federal agencies are prepared to meet the zero trust executive order requirements from the Biden Administration with just over a year until the deadline, according to Swimlane. The research investigated the confidence level of these agencies in meeti.....»»
Apple Podcasts removed "The Glenn Beck Program" likely over technical error
Over 3,000 episodes of "The Glenn Beck Program" were removed from Apple's distribution network, because of a too-large data feed pointing the service to the podcast — and all have been restored.Image Credit: The Glenn Beck ProgramOn Wednesday, Beck.....»»
Apple Podcasts removes "The Glenn Beck Program" likely over technical error
Over 3,000 episodes of "The Glenn Beck Program" have been removed from Apple's distribution network, likely because of a too-large data feed pointing the service to the podcast.Image Credit: The Glenn Beck ProgramOn Wednesday, Beck took to X to ask A.....»»
How CISOs break down complex security challenges
The role of the CISO has evolved into a critical position that encompasses many responsibilities aimed at safeguarding digital assets, preserving data integrity, and mitigating cyber threats. In essence, the role of the CISO is a complex and ever-evo.....»»
MongoDB Queryable Encryption enables organizations to meet data-privacy requirements
MongoDB Queryable Encryption helps organizations protect sensitive data when it is queried and in-use on MongoDB. It reduces the risk of data exposure for organizations and improves developer productivity by providing built-in encryption capabilities.....»»
Week in review: 8 free cybersecurity docus, vulnerable Intel Core processors, Black Hat USA 2023
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future In this Help Net Security interview, we delve into the world of c.....»»
Know the requirements for your pet"s rabies vaccination
Routine vaccinations are an essential part of your pet's veterinary care, and veterinarians typically guide owners on how often your pet needs which shots. In the case of rabies, however, owners may be asked by their veterinarian if they prefer a vac.....»»
How fame-seeking teenagers hacked some of the world’s biggest targets
With no skill in software exploitation or encryption busting, Lapsus$ wins anyway. Enlarge (credit: Getty Images) A ragtag bunch of amateur hackers, many of them teenagers with little technical training, have been so ade.....»»