Security News

Report: Organisations Have Endpoint Security Tools But Are Still Falling Short on the Basics
2024-05-13 19:02

Most IT and security teams would agree that ensuring endpoint security and network access security applications are running in compliance with security policies on managed PCs should be a basic task. The 2024 Cyber Resilience Risk Index report found that, if not supported by automated remediation technologies, top endpoint protection platforms and network access security applications are failing to maintain compliance with security policies 24% of the time across its sample of managed PCs. When combined with data showing significant delays in patching applications, Absolute Security argued organisations may be ill-equipped to make the landmark shift to AI PCs, which would require significant resourcing and direct attention away from these foundations of cyber security.

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
2024-05-13 12:06

With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to...

Establishing a security baseline for open source projects
2024-05-13 05:00

The OpenSSF community has developed open-source security tools and projects, aiming to make security the default and promote a collaborative effort to strengthen the security posture of open-source ecosystems. OpenSSF is working to combat that challenge by establishing a security baseline for open-source projects and aims to propagate it across the Linux Foundation.

AI’s rapid growth puts pressure on CISOs to adapt to new security risks
2024-05-13 04:30

"GenAI and AI have the potential to both disrupt and enhance security operations. As the acting gatekeepers - CISOs are under immense pressure," said Harold Rivas, CISO, Trellix. With cyberattacks on the rise, AI pressures mounting, and responsibilities growing, it's no surprise 90% of CISOs find themselves under increased pressure.

Critical infrastructure security will stay poor until everyone pulls together
2024-05-11 17:15

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Microsoft's Brad Smith summoned by Homeland Security committee over 'cascade' of infosec failures
2024-05-10 15:01

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Develop Valuable Cyber Security Skills Over a Lifetime for Only $56
2024-05-10 09:48

TechRepublic Premium TechRepublic Premium Editorial Calendar: Policies, Checklists, Hiring Kits and Glossaries for Download TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. Artificial Intelligence 7 Best AI Art Generators This is a comprehensive list of the best AI art generators.

Regulators are coming for IoT device security
2024-05-09 05:00

Cybersecurity is a relatively new challenge for many IoT device makers who have traditionally produced non-connected devices. IoT devices are built on a foundation of insecure software-a large portion of the open-source software and the chips used to build devices are poorly secured.

Why SMBs are facing significant security, business risks
2024-05-09 03:30

In this Help Net Security video, Alex Cox, Director of Threat Intelligence at LastPass, discusses how human factors are getting in the way while SMB leaders report investing more time, attention, and budget in cybersecurity. According to LastPass, these factors and policy and technology gaps are harming SMBs and could ultimately lead to financial losses.

A SaaS Security Challenge: Getting Permissions All in One Place
2024-05-08 14:18

Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between...