Please turn on your JavaScript for this page to function normally.
Saira Jesani
Cross-industry standards for data provenance in AI

In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its …

Shuffle Automation
Shuffle Automation: Open-source security automation platform

Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. …

malware
Ad-injecting malware posing as DwAdsafe ad blocker uses Microsoft-signed driver

ESET Research has discovered a sophisticated Chinese browser injector: a signed, vulnerable, ad-injecting driver from a mysterious Chinese company. This threat, which ESET …

cybersecurity week in review
Week in review: CrowdStrike update causes widespread IT outage, critical Splunk Enterprise flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Faulty CrowdStrike update takes out Windows machines worldwide Thousands and …

Crowdstrike
Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update

The world is 16+ hours into what looks like the biggest IT outage in history, triggered by a defective update for Crowdstrike endpoint security software for Windows machines. …

Crowdstrike
Faulty CrowdStrike update takes out Windows machines worldwide

A more recent update on the situation (July 19, 2024, 12:42 ET) Houndreds of housands and possibly millions of Windows computers and servers worldwide have been made …

networking
GenAI network acceleration requires prior WAN optimization

As GenAI models used for natural language processing, image generation, and other complex tasks often rely on large datasets that must be transmitted between distributed …

software
One-third of dev professionals unfamiliar with secure coding practices

Attackers consistently discover and exploit software vulnerabilities, highlighting the increasing importance of robust software security, according to OpenSSF and the Linux …

strategy
CISOs must shift from tactical defense to strategic leadership

Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the …

Infosec products of the week
New infosec products of the week: July 19, 2024

Here’s a look at the most interesting products from the past week, featuring releases from AuditBoard, BlueVoyant, Druva, Invicti Security, and Rezonate. AuditBoard’s …

Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)

A recently fixed vulnerability (CVE-2024-36991) affecting Splunk Enterprise on Windows “is more severe than it initially appeared,” according to SonicWall’s …

ebook CISSP career
eBook: How CISSP turns career goals into reality

CISSP carries clout. As the world’s leading cybersecurity certification, it opens many professional opportunities worldwide. Find out what led 14 successful CISSPs around the …

Don't miss

Cybersecurity news