CISOs need to consider the personal risks associated with their role
70% of cybersecurity leaders felt that stories of CISOs being held personally liable for cybersecurity incidents have negatively affected their...
Read more →70% of cybersecurity leaders felt that stories of CISOs being held personally liable for cybersecurity incidents have negatively affected their...
Read more →FuzzyAI is an open-source framework that helps organizations identify and address AI model vulnerabilities in cloud-hosted and in-house AI models,...
Read more →In this Help Net Security interview, Karl Mattson, CISO at Endor Labs, discusses strategies for enhancing secure software development. Mattson...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Horizon3.ai, SecureAuth, Stamus...
Read more →Cleo has released a security patch to address the critical vulnerability that started getting exploited while still a zero-day to...
Read more →As part of an ongoing international crackdown known as Operation PowerOFF, international law enforcement has seized over two dozen platforms...
Read more →Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information...
Read more →In this Help Net Security interview, Ben de Bont, CISO at ServiceNow, discusses AI governance, focusing on how to foster...
Read more →Keycloak is an open-source project for identity and access management (IAM). It provides user federation, strong authentication, user management, authorization,...
Read more →Since making Kerberos the default Windows authentication protocol in 2000, Microsoft has been working on eventually retiring NTLM, its less...
Read more →Cybersecurity researchers have identified a vulnerability (CVE-2024-21944, aka BadRAM) affecting ADM processors that can be triggered by rogue memory modules...
Read more →With the introduction of Cato IoT/OT Security, Cato Networks is enabling enterprises to simplify the management and security of Internet...
Read more →