Security News

How to design and deliver an effective cybersecurity exercise
2024-04-01 04:00

They are based on cyber-attack scenarios and are used by facilitators to guide participants throughout the cybersecurity exercise. Before designing a cyber exercise scenario, the controller should assess any potential constraints on resources, skills or budget for running certain types of exercises.

Advanced cybersecurity strategies boost shareholder returns
2024-03-29 05:00

Companies demonstrating advanced cybersecurity performance generate a shareholder return that is 372% higher than their peers with basic cybersecurity performance, according to a new report from Diligent and Bitsight. The report also reveals that highly regulated industries, such as healthcare and financial services, have the highest cybersecurity ratings, and companies with either a specialized risk committee or audit committee achieve better cybersecurity performance compared to those with neither, with ratings of 710 and 650 respectively.

Cybersecurity jobs available right now: March 27, 2024
2024-03-27 05:30

AKUR8 seeks a cybersecurity engineer to help improve security posture and manage internal IT duties. You'll join the cloud, IT, and security team, integrating into the SecOps & IT squad. Their mission is to build, deploy, and operate operational security controls and manage internal IT. Cyber Security Specialist - Automotive.

Cybersecurity essentials during M&A surge
2024-03-27 04:00

The volume of mergers and acquisitions has surged significantly this quarter. Data from Dealogic shows a 130% increase in US M&A activity, totaling $288 billion.

Reinforcement learning is the path forward for AI integration into cybersecurity
2024-03-26 06:00

Reinforcement learning underpins the benefit of AI to the cybersecurity ecosystem and is closest to how humans learn through experience and trial and error. AI reinforcement learning may have applicability in prediction to prevent attacks as well, learning from past experiences and low signals and using patterns to predict what might happen next time.

Strengthening critical infrastructure cybersecurity is a balancing act
2024-03-26 05:30

In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience against cyberattacks. How do current cybersecurity strategies address the critical infrastructure sectors' unique needs and vulnerabilities?

20 essential open-source cybersecurity tools that save you time
2024-03-25 06:00

When I started digging deeper into the open-source cybersecurity ecosystem, I discovered an engaged community of developers working to find practical solutions to many problems, one of them being saving time. Here are 20 essential open-source cybersecurity tools that are freely available and waiting for you to include them in your arsenal.

8 cybersecurity predictions shaping the future of cyber defense
2024-03-25 05:30

Among Gartner's top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI. Two-thirds of global 100 organizations are expected to extend directors' and officers' insurance to cybersecurity leaders due to personal legal exposure. "As we start moving beyond what's possible with GenAI, solid opportunities are emerging to help solve a number of perennial issues plaguing cybersecurity, particularly the skills shortage and unsecure human behavior. The scope of the top predictions this year is clearly not on technology, as the human element continues to gain far more attention. Any CISO looking to build an effective and sustainable cybersecurity program must make this a priority," said Deepti Gopal, Director Analyst at Gartner.

Shadow AI is the latest cybersecurity threat you need to prepare for
2024-03-22 06:00

Similarly to shadow IT, shadow AI refers to all the AI-enabled products and platforms being used within your organization that those departments don't know about. Establishing a risk matrix for AI use within your organization and defining how it will be used will allow you to have productive conversations around AI usage for the entire business.

Ivanti fixes RCE vulnerability reported by NATO cybersecurity researchers (CVE-2023-41724)
2024-03-20 18:47

Ivanti has fixed a critical RCE vulnerability in Ivanti Standalone Sentry that has been reported by researchers with the NATO Cyber Security Centre. The vulnerability affects all supported version of Ivanti Standalone Sentry as well as older, unsupported ones.