cyber risk

Using AI to drive cybersecurity risk scoring systems

Using AI to drive cybersecurity risk scoring systems 2024-11-15 at 07:18 By Help Net Security In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for cybersecurity threats, and how AI is revolutionizing risk assessment and management in cybersecurity. The post Using […]

React to this headline:

Loading spinner

Using AI to drive cybersecurity risk scoring systems Read More »

How human ingenuity continues to outpace automated security tools

How human ingenuity continues to outpace automated security tools 2024-11-11 at 06:04 By Industry News 10% of security researchers now specialize in AI technology as 48% of security leaders consider AI to be one of the greatest risks to their organizations, according to HackerOne. HackerOne’s report combines perspectives from the researcher community, customers, and security

React to this headline:

Loading spinner

How human ingenuity continues to outpace automated security tools Read More »

6 key elements for building a healthcare cybersecurity response plan

6 key elements for building a healthcare cybersecurity response plan 2024-10-30 at 06:33 By Help Net Security Medical practices remain vulnerable to cyberattacks, with over a third unable to cite a cybersecurity incident response plan, according to Software Advice. This gap exposes healthcare providers to risks of patient data breaches, HIPAA violations, financial penalties, and

React to this headline:

Loading spinner

6 key elements for building a healthcare cybersecurity response plan Read More »

SEC fines tech companies for misleading SolarWinds disclosures

SEC fines tech companies for misleading SolarWinds disclosures 2024-10-25 at 15:07 By Help Net Security The Securities and Exchange Commission charged four current and former public companies – Unisys Corp., Avaya Holdings Corp., Check Point Software Technologies Ltd, and Mimecast Limited – with making materially misleading disclosures regarding cybersecurity risks and intrusions. The SEC also

React to this headline:

Loading spinner

SEC fines tech companies for misleading SolarWinds disclosures Read More »

The most common authentication method is also the least secure

The most common authentication method is also the least secure 2024-09-30 at 06:01 By Help Net Security Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including

React to this headline:

Loading spinner

The most common authentication method is also the least secure Read More »

Companies mentioned on the dark web at higher risk for cyber attacks

Companies mentioned on the dark web at higher risk for cyber attacks 2024-09-26 at 06:01 By Help Net Security The presence of any data relating to an organization on the dark web demonstrably increases its risk of a cyber attack, according to Searchlight Cyber. Dark web insights and breach correlation Marsh McLennan Cyber Risk Intelligence

React to this headline:

Loading spinner

Companies mentioned on the dark web at higher risk for cyber attacks Read More »

Organizations are changing cybersecurity providers in wake of Crowdstrike outage

Organizations are changing cybersecurity providers in wake of Crowdstrike outage 2024-09-23 at 15:46 By Zeljka Zorz More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers. The recent

React to this headline:

Loading spinner

Organizations are changing cybersecurity providers in wake of Crowdstrike outage Read More »

Organizations overwhelmed by numerous and insecure remote access tools

Organizations overwhelmed by numerous and insecure remote access tools 2024-09-18 at 06:01 By Help Net Security Organizations are combating excessive remote access demands with an equally excessive number of tools that provide varying degrees of security, according to Claroty. Data from more than 50,000 remote-access-enabled devices showed that the volume of remote access tools deployed

React to this headline:

Loading spinner

Organizations overwhelmed by numerous and insecure remote access tools Read More »

The future of automotive cybersecurity: Treating vehicles as endpoints

The future of automotive cybersecurity: Treating vehicles as endpoints 2024-09-05 at 07:31 By Zeljka Zorz The automotive industry is facing many of the same cybersecurity risks and threats that successful organizations in other sectors are up against, but it’s also battling some distinct ones. In this Help Net Security interview, Josh Smith, Principal Threat Analyst

React to this headline:

Loading spinner

The future of automotive cybersecurity: Treating vehicles as endpoints Read More »

Airlines are flying blind on third-party risks

Airlines are flying blind on third-party risks 2024-08-01 at 06:01 By Help Net Security The aviation industry has traditionally focused on physical security threats, but recent revelations about risks on Boeing‘s supply chain have spotlighted the critical need to measure and mitigate supply chain risk, according to SecurityScorecard. The report comes as regulatory bodies worldwide

React to this headline:

Loading spinner

Airlines are flying blind on third-party risks Read More »

Why a strong patch management strategy is essential for reducing business risk

Why a strong patch management strategy is essential for reducing business risk 2024-07-29 at 07:01 By Mirko Zorz In this Help Net Security interview, Eran Livne, Senior Director of Product Management, Endpoint Remediation at Qualys and Thomas Scheffler, Security Operations Manager of Cintas Corporation, discuss their experiences with automated patch management. Scheffler details how Cintas

React to this headline:

Loading spinner

Why a strong patch management strategy is essential for reducing business risk Read More »

Researchers expose GitHub Actions workflows as risky and exploitable

Researchers expose GitHub Actions workflows as risky and exploitable 2024-07-25 at 06:31 By Help Net Security GitHub is an immensely popular platform, with over 100 million developers and over 90% of Fortune 100 companies utilizing it. Despite its widespread use, many GitHub Actions workflows remain insecure, often due to excessive privileges or high-risk dependencies. In

React to this headline:

Loading spinner

Researchers expose GitHub Actions workflows as risky and exploitable Read More »

Cyber insurance 2.0: The systemic changes required for future security

Cyber insurance 2.0: The systemic changes required for future security 2024-07-22 at 06:31 By Help Net Security Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. In this Help Net Security video, Vishaal Hariprasad, CEO at Resilience, discusses how

React to this headline:

Loading spinner

Cyber insurance 2.0: The systemic changes required for future security Read More »

Most GitHub Actions workflows are insecure in some way

Most GitHub Actions workflows are insecure in some way 2024-07-17 at 06:01 By Help Net Security Most GitHub Actions are susceptible to exploitation; they are overly privileged or have risky dependencies, according to Legit Security. GitHub Actions security flaws pose major risks The report found the GitHub Actions marketplace’s security posture to be especially concerning,

React to this headline:

Loading spinner

Most GitHub Actions workflows are insecure in some way Read More »

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices 2024-07-09 at 06:31 By Help Net Security Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff Research Engineer at Endor Labs, discusses why it causes issues and how

React to this headline:

Loading spinner

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices Read More »

Organizations weigh the risks and rewards of using AI

Organizations weigh the risks and rewards of using AI 2024-07-05 at 06:31 By Help Net Security 78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. Organizations prioritize AI risk assessment The report, based on a survey of over 400 security professionals in the US involved

React to this headline:

Loading spinner

Organizations weigh the risks and rewards of using AI Read More »

Organizations use outdated approaches to secure APIs

Organizations use outdated approaches to secure APIs 2024-07-04 at 06:31 By Help Net Security Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites, according to Cloudflare. The report underscores that the volume of threats stemming from issues in

React to this headline:

Loading spinner

Organizations use outdated approaches to secure APIs Read More »

Find out which cybersecurity threats organizations fear the most

Find out which cybersecurity threats organizations fear the most 2024-06-19 at 06:31 By Help Net Security This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance isn’t the answer for ransom payments Veeam | 2024 Ransomware Trends Report | June 2024 Ransomware remains

React to this headline:

Loading spinner

Find out which cybersecurity threats organizations fear the most Read More »

Third-party vendors pose serious cybersecurity threat to national security

Third-party vendors pose serious cybersecurity threat to national security 2024-06-04 at 07:01 By Help Net Security In this Help Net Security video, Paul Prudhomme, Principal Security Analyst at SecurityScorecard, discusses the findings of the 2024 Redefining Resilience: Concentrated Cyber Risk in a Global Economy Research report. This research details a surge in adversaries exploiting third-party

React to this headline:

Loading spinner

Third-party vendors pose serious cybersecurity threat to national security Read More »

Worried about job security, cyber teams hide security incidents

Worried about job security, cyber teams hide security incidents 2024-05-24 at 07:01 By Help Net Security The frequency and severity of cyberattacks are increasing—yet most businesses remain unprepared, according to VikingCloud. Between a growing talent shortage, alert fatigue, and new sophisticated attack methods, companies are more susceptible than ever. The research reveals that 40% of

React to this headline:

Loading spinner

Worried about job security, cyber teams hide security incidents Read More »

Scroll to Top