Please turn on your JavaScript for this page to function normally.
compliance
Security providers view compliance as a high-growth opportunity

85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the …

Vulnerability
AI’s role in accelerating vulnerability management

With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management …

strategy
Why CISOs need to build cyber fault tolerance into their business

CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to outdated zero tolerance for failure mindsets, …

GenAI
Cybersecurity pros change strategies to combat AI-powered threats

75% of security professionals had to change their cybersecurity strategy in the last year due to the rise in AI-powered cyber threats, with 73% expressing a greater focus on …

privacy
Protecting identity in a world of deepfakes and social engineering

In this Help Net Security video round-up, security experts discuss various aspects of identity verification and security, including generative AI’s impact, the state of …

cybersecurity week in review
Week in review: Atlassian Confluence RCE PoC, new Kali Linux, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: High-risk Atlassian Confluence RCE fixed, PoC available (CVE-2024-21683) If …

Patch Tuesday
June 2024 Patch Tuesday forecast: Multiple announcements from Microsoft

June 2024 Patch Tuesday is now live: Microsoft fixes RCE vulnerabilities in MSMQ, Outlook (CVE-2024-30080, CVE-2024-30103) May 2024 Patch Tuesday was unusual because we had …

ransomware
Cyber insurance isn’t the answer for ransom payments

Ransomware remains an ongoing threat for organizations and is the largest single cause of IT outages and downtime as 41% of data is compromised during a cyberattack, according …

AI
Unpacking CISA’s AI guidelines

CISA’s late April AI and infrastructure guidelines address 16 sectors along with their cybersecurity needs and operations concerning the growth of AI as a tool to build both …

email overload
26% of organizations lack any form of IT security training

26% of organizations don’t provide IT security training to end-users, according to Hornetsecurity. The Hornetsecurity survey, which compiled feedback from industry …

Infosec products of the week
New infosec products of the week: June 7, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Appdome, SailPoint, Tines, Trend Micro, Verimatrix, and Zyxel Networks. Zyxel …

Focus on what matters most: Exposure management and your attack surface

Read the full article for key points from Intruder’s VP of Product, Andy Hornehold’s recent talk on exposure management. If you’d like to hear Andy’s insights first-hand, …

Don't miss

Cybersecurity news