Security News

Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams
2024-04-25 14:00

Only 17% of respondents to the ISC2 Cybersecurity Workforce Study were women, showing a continued struggle for workplaces to recruit and retain women in this industry. Notably, women reported more women on their teams: 30% of women said there were other women on their teams, as opposed to 22% of men.

Overcoming GenAI challenges in healthcare cybersecurity
2024-04-25 04:00

What are the key cybersecurity challenges in healthcare in the context of GenAI, and how can they be effectively addressed? How do you see GenAI transforming healthcare operations and patient care, especially regarding efficiency and decision-making?

25 cybersecurity AI stats you should know
2024-04-25 03:30

Today, enterprises block 18.5% of all AI transactions, a 577% increase from April to January, for a total of more than 2.6 billion blocked transactions. AI tools put companies at risk of data exfiltration.

Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape
2024-04-24 16:11

AI's newfound accessibility will cause a surge in prompt hacking attempts and private GPT models used for nefarious purposes, a new report revealed. Experts at the cyber security company Radware forecast the impact that AI will have on the threat landscape in the 2024 Global Threat Analysis Report.

CISO Perspectives on Complying with Cybersecurity Regulations
2024-04-24 09:24

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the...

Cybersecurity jobs available right now: April 24, 2024
2024-04-24 03:30

As a Cyber Security Incident Response Specialist, you will be responsible for the operational IT security of PHOENIX Corporate IT, information security event management and incident response, threat hunting and coordination of mitigation measures. As Information Security Specialist, you will assist in developing information security policies, procedures and necessary documents in compliance with applicable standards and regulations, conduct phishing and social engineering test campaigns, measure key performance indicators to ensure the effectiveness of information security controls.

The relationship between cybersecurity and work tech innovation
2024-04-24 03:00

As organizations navigate the complexities of hybrid work arrangements and the gradual return to the office, the cybersecurity threat landscape has become increasingly challenging, with issues such as the proliferation of personal devices, the expansion of remote access points, and the potential for security gaps between in-office and remote environments. Issues such as the proliferation of personal devices, the expansion of remote access points, and the potential for security gaps between in-office and remote environments have compounded these challenges.

10 colleges and universities shaping the future of cybersecurity education
2024-04-23 04:00

Institutions featured on this list often provide undergraduate and graduate degrees, courses, as well as certificate programs tailored to meet the growing demand for cybersecurity professionals in...

NIST Cybersecurity Framework: A Cheat Sheet for Professionals (Free PDF)
2024-04-22 16:00

The tech world has a problem: Security fragmentation. There's no standard set of rules or even language for mitigating cyber risk used to address the growing threats of hackers, ransomware and stolen data, and the threat to data only continues to grow.

How to improve response to emerging cybersecurity threats
2024-04-22 03:00

Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos featuring security experts discussing various cybersecurity aspects and best practices in different domains.