Please turn on your JavaScript for this page to function normally.
Apiiro
A closer look at Apiiro’s SHINE partner program

In this Help Net Security video, Adam LaGreca, Founder of 10KMedia, sat down with John Leon, VP of Partnerships at Apiiro, discusses the company’s new technology partner …

CVE
Why cloud vulnerabilities need CVEs

When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and how you manage risk …

cloud security
Building a strong cloud security posture

In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many …

zero trust
Essential steps for zero-trust strategy implementation

63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, …

Infosec products of the month
Infosec products of the month: April 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, …

law
FCC fines major wireless carriers over illegal location data sharing

The Federal Communications Commission (FCC) fined the nation’s largest wireless carriers for illegally sharing access to customers’ location information without consent and …

connected car
Why the automotive sector is a target for email-based cyber attacks

While every organization across every vertical is at risk of advanced email attacks, certain industries periodically become the go-to target for threat actors. In this Help …

passwords
Passwords under seven characters can be easily cracked

Any password under seven characters can be cracked within a matter of hours, according to Hive Systems. The time it takes to crack passwords increases Due to the widespread …

GenAI
Security analysts believe more than half of tasks could be automated

Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI …

ISC2 eBook
eBook: Do you have what it takes to lead in cybersecurity?

Organizations worldwide need talented, experienced, and knowledgeable cybersecurity teams who understand the advantages and risks of emerging technologies. Aspiring leaders in …

Pathfinder
Researchers unveil novel attack methods targeting Intel’s conditional branch predictor

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise …

DHS
DHS establishes AI Safety and Security Board to protect critical infrastructure

The Department of Homeland Security announced the establishment of the Artificial Intelligence Safety and Security Board (the Board). The Board will advise the Secretary, the …

Don't miss

Cybersecurity news