How to go from collecting risk data to actually reducing risk?
Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move...
Read more →Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move...
Read more →The CISO role was partially shielded from the macroeconomic challenges of 2023, according to a new research from IANS and...
Read more →In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report...
Read more →Businesses are actively moving to eradicate passwords from employees’ lives, with 89% of IT leaders expecting passwords to represent less...
Read more →Cyber entities continue to show a persistent interest in targeting critical infrastructure by taking advantage of vulnerable OT assets. To...
Read more →A previously unknown vulnerability (CVE-2023-20198) affecting networking devices running Cisco IOS XE software is being exploited by a threat actor...
Read more →A threat actor is using compromised Skype accounts to deliver the DarkGate malware to target organizations, Trend Micro researchers have...
Read more →Microsoft is offering up to $15,000 to bug hunters that pinpoint vulnerabilities of Critical or Important severity in its AI-powered...
Read more →Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new...
Read more →86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and...
Read more →97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Turning military veterans into cybersecurity...
Read more →