Security News

Businesses turn to private AI for enhanced security and data management
2024-09-30 03:30

In this Help Net Security interview, Joe Baguley, CTO EMEA at Broadcom, shares insights on private AI and its significance in data security. He explains how it helps organizations maintain control...

Compliance management strategies for protecting data in complex regulatory environments
2024-09-26 04:00

In this Help Net Security interview, Andrius Buinovskis, Head of Product at NordLayer, discusses how organizations can assess their compliance management and ensure they meet regulatory...

Transportation, logistics companies targeted with lures impersonating fleet management software
2024-09-24 14:43

Financially motivated threat actors are targeting North American companies in the transportation and logistics sector with tailored lures, info-stealing malware, and a clever new trick. How the...

Passwordless AND Keyless: The Future of (Privileged) Access Management
2024-09-20 11:00

In IT environments, some secrets are managed well and some fly under the radar. Here’s a quick checklist of what kinds of secrets companies typically manage, including one type they should manage:...

Ivanti fixes critical vulnerabilities in Endpoint Management (CVE-2024-29847)
2024-09-11 11:50

Ivanti has fixed a slew of vulnerabilities affecting its Endpoint Manager solution, including a maximum severity one (CVE-2024-29847) that may allow unauthenticated attackers to remotely execute...

Ivanti fixes maximum severity RCE bug in Endpoint Management software
2024-09-10 19:28

Ivanti has fixed a maximum severity vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers gain remote code execution on the core server. [...]

Navigating Endpoint Privilege Management: Insights for CISOs and Admins
2024-09-10 14:02

Understanding endpoint privilege management is key to defending organizations from advanced attacks. Learn more from ThreatLocker on using endpoint privilege management to better secure your org's...

Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management
2024-09-02 08:55

The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this high-stakes game, security leaders need every...

Third-party risk management is under the spotlight
2024-08-29 03:00

In the aftermath of the CrowdStrike IT outage, new research has uncovered a critical vulnerability within financial institutions regarding supply chain resilience. The outage has demonstrated the...

Audit finds notable security gaps in FBI's storage media management
2024-08-25 14:14

An audit from the Department of Justice's Office of the Inspector General (OIG) identified "significant weaknesses" in FBI's inventory management and disposal of electronic storage media...