Security News

Strengthening critical infrastructure cybersecurity is a balancing act
2024-03-26 05:30

In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience against cyberattacks. How do current cybersecurity strategies address the critical infrastructure sectors' unique needs and vulnerabilities?

20 essential open-source cybersecurity tools that save you time
2024-03-25 06:00

When I started digging deeper into the open-source cybersecurity ecosystem, I discovered an engaged community of developers working to find practical solutions to many problems, one of them being saving time. Here are 20 essential open-source cybersecurity tools that are freely available and waiting for you to include them in your arsenal.

8 cybersecurity predictions shaping the future of cyber defense
2024-03-25 05:30

Among Gartner's top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI. Two-thirds of global 100 organizations are expected to extend directors' and officers' insurance to cybersecurity leaders due to personal legal exposure. "As we start moving beyond what's possible with GenAI, solid opportunities are emerging to help solve a number of perennial issues plaguing cybersecurity, particularly the skills shortage and unsecure human behavior. The scope of the top predictions this year is clearly not on technology, as the human element continues to gain far more attention. Any CISO looking to build an effective and sustainable cybersecurity program must make this a priority," said Deepti Gopal, Director Analyst at Gartner.

Shadow AI is the latest cybersecurity threat you need to prepare for
2024-03-22 06:00

Similarly to shadow IT, shadow AI refers to all the AI-enabled products and platforms being used within your organization that those departments don't know about. Establishing a risk matrix for AI use within your organization and defining how it will be used will allow you to have productive conversations around AI usage for the entire business.

Ivanti fixes RCE vulnerability reported by NATO cybersecurity researchers (CVE-2023-41724)
2024-03-20 18:47

Ivanti has fixed a critical RCE vulnerability in Ivanti Standalone Sentry that has been reported by researchers with the NATO Cyber Security Centre. The vulnerability affects all supported version of Ivanti Standalone Sentry as well as older, unsupported ones.

Quick Glossary: Cybersecurity Countermeasures
2024-03-20 16:00

Cybersecurity attacks are inevitable for modern businesses. It is vital that businesses deploy countermeasures to mitigate the damage these attacks cause.

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security
2024-03-20 15:05

Cyber security company Proofpoint recently surveyed 7,500 employees and 1,050 security professionals in 15 countries, including Australia, Japan, South Korea and Singapore. Employees in the Asia-Pacific region were the most likely among global employees surveyed to say they were unsure about their personal responsibility for cyber security.

Regulatory measures boost cybersecurity industry
2024-03-20 03:45

As the GCC cybersecurity industry continues to grow-F&S estimates it will triple in value by 2030 to reach $13.4 billion-countries in the region continue to reduce their dependence on oil exports and opt for digital tools and technologies instead. Middle East braces for escalating cyber threats. In the UAE and Saudi Arabia, specifically, technology adoption has increased across the finance, healthcare, and manufacturing sectors, further boosting the need for cybersecurity and robust regulatory frameworks.

Quick Glossary: Cybersecurity Attack Response and Mitigation
2024-03-19 16:00

This quick glossary, created by Mark W. Kaelin for TechRepublic Premium, explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack. Evidence may include documents, logs, software or hardware.

Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
2024-03-19 10:37

In an era where digital transformation drives business across sectors, cybersecurity has transcended its traditional operational role to become a cornerstone of corporate strategy and risk...