Women rising in cybersecurity roles, but roadblocks remain
The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several...
Read more →The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several...
Read more →In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women...
Read more →When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and...
Read more →Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for...
Read more →63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing...
Read more →Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint,...
Read more →There are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the...
Read more →The Federal Communications Commission (FCC) fined the nation’s largest wireless carriers for illegally sharing access to customers’ location information without...
Read more →Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module...
Read more →Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according...
Read more →In this Help Net Security interview, Mike Lemberger, Visa’s SVP, Chief Risk Officer, North America, discusses the severe financial losses...
Read more →Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially...
Read more →