Why zero trust should be the foundation of your cybersecurity ecosystem
For cybersecurity professionals, it is a huge challenge to separate the “good guys” from the “villains”. In the past, most cyberattacks could simply be traced to external cybercriminals, cyberterrorists, or rogue nation-states. But not anymor.....»»
Tips to keep your smartphone just as safe as a government official’s
A top U. S. government cybersecurity agency has released a set of smartphone safety protocols for top officials and politicians. You should follow them, too......»»
AI is becoming the weapon of choice for cybercriminals
AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overre.....»»
Why cybersecurity is critical to energy modernization
In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresse.....»»
CISA orders federal agencies to secure their Microsoft cloud environments
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implement.....»»
Ransomware in 2024: New players, bigger payouts, and smarter tactics
In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this article,.....»»
Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»
Ataccama ONE platform enhancements accelerate enterprise data quality initiatives
Ataccama announced enhancements to the Ataccama ONE unified data trust platform v15.4 that enable customers to have confidence in using their data for business-critical decision-making. In this latest release, enhancements include augmenting its AI c.....»»
Trust in US media hit an all-time low in 2024. New survey shows Black midwesterners have found other sources
In 2024, Gallup reported Americans' trust in media was at an all-time low......»»
Report: Ecological crises are interconnected and must be tackled in a coordinated way
Maria J. Santos, a professor at the University of Zurich, is one of the main authors of the comprehensive scientific analysis published this week by the Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services (IPBES). At a pr.....»»
AirPods Max four years later: a missed spatial computing opportunity
At four years old, AirPods Max feel like a stagnant product that should be so much more, but the premium sound and Apple ecosystem features keep them from going completely stale.AirPods Max review: missing out on the latest techDecember 15, 2020 was.....»»
Consumers wrongly attribute all data breaches to cybercriminals
Breaches in 2024 had less impact on consumers’ trust in brands compared to the previous year (a 6.5% decrease from 62% in 2023 to 58% in 2024), according to a recent Vercara report. Most consumers also remain unaware of the role they may play in cy.....»»
These are my favorite Find My accessories this holiday season [Updated]
There’s a robust ecosystem of Find My accessories on the market nowadays. All of these accessories would make great holiday gifts this year across all kinds of different form factors. What’s a better gift than giving someone a way to keep trac.....»»
Cybersecurity jobs available right now: December 17, 2024
CISO ONE Security | Israel | Hybrid – View job details As a CISO, you will be responsible for overseeing information security, cybersecurity, application security, and business continuity strategies. The role involves implementing and.....»»
The shifting security landscape: 2025 predictions and challenges
As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing the c.....»»
In IT? Need cash? Cybersecurity whistleblowers are earning big payouts.
The US government now relies on whistleblowers to bring many cases. Matthew Decker is the former chief information officer for Penn State University’s Applied Research Laborator.....»»
Risk Aperture AI360 manages AI-specific vulnerabilities and threats
Risk Aperture launched AI360, a solution designed to address the growing cybersecurity risks posed by artificial intelligence (AI). AI360 leverages proprietary algorithms, predictive analytics, and machine learning to deliver actionable insights, he.....»»
Schools are facing greater cybersecurity threats than ever before
Most parents are confident in school’s cyber safeguarding, but this trust might be misplaced......»»
Overlooking platform security weakens long-term cybersecurity posture
Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. The report, based on a global study of 800+ IT and security decision-ma.....»»
Week in review: Microsoft fixes exploited 0-day, top cybersecurity books for your holiday gift list
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes exploited zero-day (CVE-2024-49138) On December 2024 Patch Tuesday, Microsoft resolved 71 vulnerabilities in a variety of its produc.....»»
I love iPhone Mirroring, and would like these three changes
Continuity is one of the biggest strengths of the Apple ecosystem, and iPhone Mirroring is a great addition to that – letting us not only mirror our iPhone to our Mac desktop, but also take full control of it. I’m a huge fan of the feature, an.....»»