cybersecurity

Kubernetes Bill of Materials (KBOM) open-source tool enhances cloud security response to CVEs

Kubernetes Bill of Materials (KBOM) open-source tool enhances cloud security response to CVEs 10/05/2023 at 09:26 By Help Net Security Kubernetes Security Operations Center (KSOC) released the first-ever Kubernetes Bill of Materials (KBOM) standard. Available in an open-source CLI tool, this KBOM enables cloud security teams to understand the scope of third-party tooling in their […]

React to this headline:

Loading spinner

Kubernetes Bill of Materials (KBOM) open-source tool enhances cloud security response to CVEs Read More »

Company executives can’t afford to ignore cybersecurity anymore

Company executives can’t afford to ignore cybersecurity anymore 10/05/2023 at 06:00 By Help Net Security Asked about the Board and C-Suite‘s understanding of cybersecurity across the organisation, only 39% of respondents think their company’s leadership has a sound understanding of cybersecurity’s role as a business enabler, according to Delinea. The high cost of ignoring security

React to this headline:

Loading spinner

Company executives can’t afford to ignore cybersecurity anymore Read More »

To enable ethical hackers, a law reform is needed

To enable ethical hackers, a law reform is needed 09/05/2023 at 08:13 By Help Net Security Organizations need to be able to match the ingenuity and resources of cybercriminals to better defend themselves against the increasing number of threats and attacks that could paralyze their business. Unfortunately, some laws restrict genuine security research. As we

React to this headline:

Loading spinner

To enable ethical hackers, a law reform is needed Read More »

How 2022’s threats will impact the global landscape in 2023

How 2022’s threats will impact the global landscape in 2023 09/05/2023 at 08:13 By Help Net Security In this Help Net Security video, Devon Kerr, Team Lead, Elastic Security Labs, talks about the 2023 Global Threat Report Spring edition. Key takeaways In this report, the Elastic Security team highlights how they’ve noticed a slight increase

React to this headline:

Loading spinner

How 2022’s threats will impact the global landscape in 2023 Read More »

Your voice could be your biggest vulnerability

Your voice could be your biggest vulnerability 08/05/2023 at 08:09 By Help Net Security AI technology is fueling a rise in online voice scams, with just three seconds of audio required to clone a person’s voice, according to McAfee. McAfee surveyed 7,054 people from seven countries and found that a quarter of adults had previously

React to this headline:

Loading spinner

Your voice could be your biggest vulnerability Read More »

The WhatsApp of secure computation

The WhatsApp of secure computation 08/05/2023 at 08:09 By Help Net Security A key term when discussing encryption these days is end-to-end (E2E) encryption. The idea with E2E encryption is that data is kept confidential between the encryptor and the intended receiver. This might seem an obvious requirement, but not all so-called secure systems offer

React to this headline:

Loading spinner

The WhatsApp of secure computation Read More »

Scroll to Top