Please turn on your JavaScript for this page to function normally.
quantum computing
Real-world examples of quantum-based attacks

Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from …

Building resilience through DevSecOps

DevSecOps, short for Development, Security, and Operations, is an approach that emphasizes the integration of security practices and principles into every stage of the …

cyber threat
Generative AI outperforms hackers but not their creativity

72% of hackers are confident that AI cannot replace human creativity in security research and vulnerability management, according to Bugcrowd. Generative AI hacking Generative …

satellite
Satellites lack standard security mechanisms found in mobile phones and laptops

Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed the security mechanisms of satellites currently …

data analytics
Top priorities for chief audit executives in 2023

The top focus areas for chief audit executives (CAEs) in 2023 are advancing data analytics, assuring proliferating digital risks, and talent management, according to Gartner. …

White House
White House publishes National Cybersecurity Strategy Implementation Plan

The Biden-Harris Administration’s recently released National Cybersecurity Strategy calls for two fundamental shifts in how the United States allocates roles, …

large language models
Combatting data governance risks of public generative AI tools

When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or …

NetSPI ASM
Attack Surface Management: Identify and protect the unknown

In this Help Net Security video, Brianna McGovern, Product Manager, Attack Surface Management, NetSPI, discusses Attack Surface Management (ASM). Attack Surface Management …

malware
20% of malware attacks bypass antivirus protection

Security leaders are concerned about attacks that leverage malware-exfiltrated authentication data, with 53% expressing extreme concern and less than 1% admitting they weren’t …

lock
Infrastructure upgrades alone won’t guarantee strong security

While 75% of organizations have made significant strides to upgrade their infrastructure in the past year, including the adoption of public cloud hosting and containerization, …

servers
Only 45% of cloud data is currently encrypted

39% of businesses have experienced a data breach in their cloud environment last year, an increase on the 35% reported in 2022, according to Thales. In addition, human error …

ransomware
Staying ahead of the “professionals”: The service-oriented ransomware crime industry

Ransomware has been a hugely profitable industry for criminal gangs for the last few years. The total amount of ransom paid since 2020 is estimated to be at least $2 billion, …

Don't miss

Cybersecurity news