cybersecurity

Realm: Open-source adversary emulation framework

Realm: Open-source adversary emulation framework 2024-07-15 at 07:32 By Mirko Zorz Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm is unique in its custom interpreter written in Rust. This allows us to write complex TTPs as code. With these actions as code, […]

React to this headline:

Loading spinner

Realm: Open-source adversary emulation framework Read More »

Discover the growing threats to data security

Discover the growing threats to data security 2024-07-15 at 07:01 By Mirko Zorz In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their data security risks. Adduri emphasizes the necessity of ongoing monitoring and automation to keep up with evolving threats and maintain the shortest

React to this headline:

Loading spinner

Discover the growing threats to data security Read More »

Pressure mounts for C-Suite executives to implement GenAI solutions

Pressure mounts for C-Suite executives to implement GenAI solutions 2024-07-15 at 06:01 By Help Net Security 87% of C-Suite executives feel under pressure to implement GenAI solutions at speed and scale, according to RWS. Despite these pressures, 76% expressed an overwhelming excitement across their organization for the potential benefits of GenAI. However, this excitement is

React to this headline:

Loading spinner

Pressure mounts for C-Suite executives to implement GenAI solutions Read More »

How to design a third-party risk management framework

How to design a third-party risk management framework 2024-07-12 at 07:31 By Help Net Security Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which can be used by hackers to attack an organization. Through a strong TPRM framework, companies gain

React to this headline:

Loading spinner

How to design a third-party risk management framework Read More »

Managing cyberattack fallout: Financial and operational damage

Managing cyberattack fallout: Financial and operational damage 2024-07-12 at 07:01 By Mirko Zorz In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations and financial health. Beyond immediate disruptions and financial burdens, cyber incident can severely damage a company’s reputation among customers and partners. Can

React to this headline:

Loading spinner

Managing cyberattack fallout: Financial and operational damage Read More »

Top priorities for compliance leaders this year

Top priorities for compliance leaders this year 2024-07-12 at 06:31 By Help Net Security Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according to Gartner. Improving third party risk management (TPRM), and ensuring compliance programs can keep pace with fast-moving regulatory requirements are the

React to this headline:

Loading spinner

Top priorities for compliance leaders this year Read More »

How AI helps decode cybercriminal strategies

How AI helps decode cybercriminal strategies 2024-07-11 at 07:32 By Help Net Security With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true applications and empty promises of the technology. The quest for tangible business benefits is in full swing,

React to this headline:

Loading spinner

How AI helps decode cybercriminal strategies Read More »

Strengthening cybersecurity preparedness with defense in depth

Strengthening cybersecurity preparedness with defense in depth 2024-07-11 at 07:01 By Mirko Zorz In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international inconsistencies on global operations, and the board’s role in cybersecurity. What are the top cybersecurity preparedness measures that businesses

React to this headline:

Loading spinner

Strengthening cybersecurity preparedness with defense in depth Read More »

Travel scams exposed: How to recognize and avoid them

Travel scams exposed: How to recognize and avoid them 2024-07-11 at 06:31 By Help Net Security In this Help Net Security video, Aaron Walton, Threat Intel Analyst at Expel, discusses travel scams. For the past 18 months, the Expel SOC team has observed a campaign targeting administrative credentials for Booking.com. The attackers create phishing emails

React to this headline:

Loading spinner

Travel scams exposed: How to recognize and avoid them Read More »

Valuable insights for making the right cybersecurity decisions

Valuable insights for making the right cybersecurity decisions 2024-07-11 at 06:01 By Help Net Security This article compiles excerpts from various reports, presenting statistics and insights that could be helpful for CISOs. CISOs becoming more comfortable with risk levels Netskope | The Modern CISO: Bringing Balance | June 2024 Contradicting legacy stereotypes of the CISO

React to this headline:

Loading spinner

Valuable insights for making the right cybersecurity decisions Read More »

Diversifying cyber teams to tackle complex threats

Diversifying cyber teams to tackle complex threats 2024-07-10 at 08:01 By Help Net Security Technologies such as GenAI, ML and IoT are giving threat actors new tools that make it easier to target consumers and organizations. From Savvy Seahorse which lures victims into investment scams, to a self-replicating AI worm that uses the likes of

React to this headline:

Loading spinner

Diversifying cyber teams to tackle complex threats Read More »

How companies increase risk exposure with rushed LLM deployments

How companies increase risk exposure with rushed LLM deployments 2024-07-10 at 07:31 By Mirko Zorz In this Help Net Security interview, Jake King, Head of Threat & Security Intelligence at Elastic, discusses companies’ exposure to new security risks and vulnerabilities as they rush to deploy LLMs. King explains how LLMs pose significant risks to data

React to this headline:

Loading spinner

How companies increase risk exposure with rushed LLM deployments Read More »

73% of security pros use unauthorized SaaS applications

73% of security pros use unauthorized SaaS applications 2024-07-10 at 06:01 By Help Net Security 73% of security professionals admit to using SaaS applications that had not been provided by their company’s IT team in the past year, according to Next DLP. Unauthorized tool use poses major risks for organizations This is despite the fact

React to this headline:

Loading spinner

73% of security pros use unauthorized SaaS applications Read More »

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella 2024-07-09 at 07:31 By Help Net Security Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with Microsoft products and services. Over the past several years, Microsoft has suffered several serious attacks with

React to this headline:

Loading spinner

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella Read More »

Exploring the root causes of the cybersecurity skills gap

Exploring the root causes of the cybersecurity skills gap 2024-07-09 at 07:01 By Mirko Zorz In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the need for diverse talent and continuous upskilling in areas like AI and cloud computing. Gandy

React to this headline:

Loading spinner

Exploring the root causes of the cybersecurity skills gap Read More »

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices 2024-07-09 at 06:31 By Help Net Security Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff Research Engineer at Endor Labs, discusses why it causes issues and how

React to this headline:

Loading spinner

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices Read More »

How nation-state cyber attacks disrupt public services and undermine citizen trust

How nation-state cyber attacks disrupt public services and undermine citizen trust 2024-07-08 at 07:01 By Mirko Zorz In this Help Net Security interview, Rob Greer, VP and GM of the Enterprise Security Group at Broadcom, discusses the impact of nation-state cyber attacks on public sector services and citizens, as well as the broader implications for

React to this headline:

Loading spinner

How nation-state cyber attacks disrupt public services and undermine citizen trust Read More »

Organizations change recruitment strategies to find cyber talent

Organizations change recruitment strategies to find cyber talent 2024-07-08 at 06:01 By Help Net Security An estimated 4 million professionals are needed to fill the growing cybersecurity workforce gap, according to Fortinet. At the same time, Fortinet’s 2024 Global Cybersecurity Skills Gap Report found that 70% of organizations indicated that the cybersecurity skills shortage creates

React to this headline:

Loading spinner

Organizations change recruitment strategies to find cyber talent Read More »

99% of IoT exploitation attempts rely on previously known CVEs

99% of IoT exploitation attempts rely on previously known CVEs 2024-07-05 at 07:31 By Help Net Security The explosion of Internet of Things (IoT) devices has brought about a wide range of security and privacy challenges, according to Bitdefender and NETGEAR. The report is based on global telemetry of 3.8 million homes and 50 million

React to this headline:

Loading spinner

99% of IoT exploitation attempts rely on previously known CVEs Read More »

47% of corporate data stored in the cloud is sensitive

47% of corporate data stored in the cloud is sensitive 2024-07-05 at 07:01 By Help Net Security As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications (31%), cloud storage (30%) and cloud management infrastructure (26%) cited as the

React to this headline:

Loading spinner

47% of corporate data stored in the cloud is sensitive Read More »

Scroll to Top