Category: HelpnetSecurity

From Windows 9x to 11: Tracing Microsoft's security evolution
31
Oct
2023

From Windows 9x to 11: Tracing Microsoft’s security evolution

Over its journey from Windows 9x to Windows 11, Microsoft has implemented multiple security overhauls, each addressing the challenges of…

A closer look at healthcare's battle with AI-driven attacks
31
Oct
2023

A closer look at healthcare’s battle with AI-driven attacks

With its wealth of sensitive patient data, the healthcare industry has become a prime target for cybercriminals leveraging AI tools….

Vulnerability management metrics: How to measure success
31
Oct
2023

Vulnerability management metrics: How to measure success

Without the right metrics, vulnerability management is pretty pointless. If you’re not measuring, how do you know it’s working? So…

The hidden costs of data breaches for small businesses
31
Oct
2023

The hidden costs of data breaches for small businesses

Nearly 8 in 10 small business leaders admit they are anxious about the safety of their company’s sensitive data and…

Immuta Discover identifies and classifies sensitive data
30
Oct
2023

Immuta Discover identifies and classifies sensitive data

Immuta released Immuta Discover, a new product for automated tagging and classification on cloud data platforms. Immuta Discover enables data…

White House issues Executive Order for safe, secure, and trustworthy AI
30
Oct
2023

White House issues Executive Order for safe, secure, and trustworthy AI

President Biden issued a landmark Executive Order to ensure that America leads the way in seizing the promise and managing…

Logging Made Easy: Free log management solution from CISA
30
Oct
2023

Logging Made Easy: Free log management solution from CISA

CISA launched a new version of Logging Made Easy (LME), a straightforward log management solution for Windows-based devices that can…

Google expands bug bounty program to cover AI-related threats
30
Oct
2023

Google expands bug bounty program to cover AI-related threats

Google has expanded its bug bounty program, aka Vulnerability Rewards Program (VRP), to cover threats that could arise from Google’s…

The dangers of dual ransomware attacks
30
Oct
2023

The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet…

AI threat landscape: Model theft and inference attacks emerge as top concerns
30
Oct
2023

AI threat landscape: Model theft and inference attacks emerge as top concerns

Generative AI has emerged as a powerful tool, heralded for its potential but also scrutinized for its implications. Enterprises will…

Companies scramble to integrate immediate recovery into ransomware plans
30
Oct
2023

Companies scramble to integrate immediate recovery into ransomware plans

More than one-third of companies still do not have a well-rounded, holistic ransomware strategy in place, according to Zerto. Immediate…

Cyber attacks cause revenue losses in 42% of small businesses
30
Oct
2023

Cyber attacks cause revenue losses in 42% of small businesses

85% of small business leaders say they are ready to respond to a cyber incident despite a record-high 73% reporting…