Security News

Ivanti has fixed a critical RCE vulnerability in Ivanti Standalone Sentry that has been reported by researchers with the NATO Cyber Security Centre. The vulnerability affects all supported version of Ivanti Standalone Sentry as well as older, unsupported ones.

Cybersecurity attacks are inevitable for modern businesses. It is vital that businesses deploy countermeasures to mitigate the damage these attacks cause.

Cyber security company Proofpoint recently surveyed 7,500 employees and 1,050 security professionals in 15 countries, including Australia, Japan, South Korea and Singapore. Employees in the Asia-Pacific region were the most likely among global employees surveyed to say they were unsure about their personal responsibility for cyber security.

As the GCC cybersecurity industry continues to grow-F&S estimates it will triple in value by 2030 to reach $13.4 billion-countries in the region continue to reduce their dependence on oil exports and opt for digital tools and technologies instead. Middle East braces for escalating cyber threats. In the UAE and Saudi Arabia, specifically, technology adoption has increased across the finance, healthcare, and manufacturing sectors, further boosting the need for cybersecurity and robust regulatory frameworks.

This quick glossary, created by Mark W. Kaelin for TechRepublic Premium, explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack. Evidence may include documents, logs, software or hardware.

In an era where digital transformation drives business across sectors, cybersecurity has transcended its traditional operational role to become a cornerstone of corporate strategy and risk...

The role involves working within a security team to protect the organization's cloud environments, implement and maintain security systems, and contribute to incident response efforts. This role will work cross functionally across many security teams within the Cybersecurity Operations Center and will report directly to the Director of the Cybersecurity Operations Center.

Transitioning to memory-safe languages: Challenges and considerationsIn this Help Net Security interview, Omkhar Arasaratnam, General Manager at the Open Source Security Foundation, discusses the evolution of memory-safe programming languages and their emergence in response to the limitations of languages like C and C++. LastPass' CIO vision for driving business strategy, innovationRecently, LastPass appointed Asad Siddiqui as its CIO. He brings over two decades of experience leading startups and large technology organizations. MobSF: Open-source security research platform for mobile appsThe Mobile Security Framework is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobile.

Organisations surveyed in the report acknowledge that burnout and fatigue have contributed to lower team productivity, the success of some cyber attacks and employees choosing to seek new roles or leave the industry entirely. Burnout among cyber pros a known problem for years in APAC. Burnout in cybersecurity is a well-known problem.

With new threats like AI and deepfake technology, the stakes are higher than ever to execute a strong cyber defense. Many human risk factors in particular - which represent today's biggest cybersecurity gap - remain unaddressed and outside of cybersecurity professionals' control.