Category: HelpnetSecurity

Understanding emerging AI and data privacy regulations
02
May
2024

Understanding emerging AI and data privacy regulations

In this Help Net Security interview, Sophie Stalla-Bourdillon, Senior Privacy Counsel & Legal Engineer at Immuta, discusses the AI Act,…

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element
02
May
2024

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element

The exploitation of vulnerabilities as an initial point of entry almost tripled from the previous year, accounting for 14% of…

Securing your organization's supply chain: Reducing the risks of third parties
02
May
2024

Securing your organization’s supply chain: Reducing the risks of third parties

When Stephen Hawking said that “we are all now connected by the internet, like neurons in a giant brain”, very…

reNgine: Open-source automated reconnaissance framework for web applications
02
May
2024

reNgine: Open-source automated reconnaissance framework for web applications

reNgine is an open-source automated reconnaissance framework for web applications that focuses on a highly configurable and streamlined recon process….

Women rising in cybersecurity roles, but roadblocks remain
02
May
2024

Women rising in cybersecurity roles, but roadblocks remain

The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several…

Making cybersecurity more appealing to women, closing the skills gap
01
May
2024

Making cybersecurity more appealing to women, closing the skills gap

In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women…

Why cloud vulnerabilities need CVEs
01
May
2024

Why cloud vulnerabilities need CVEs

When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and…

Cybersecurity jobs available right now: May 1, 2024
01
May
2024

Cybersecurity jobs available right now: May 1, 2024

Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for…

Essential steps for zero-trust strategy implementation
01
May
2024

Essential steps for zero-trust strategy implementation

63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing…

Infosec products of the month: April 2024
01
May
2024

Infosec products of the month: April 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint,…

Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
30
Apr
2024

Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades

There are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the…

FCC fines major wireless carriers over illegal location data sharing
30
Apr
2024

FCC fines major wireless carriers over illegal location data sharing

The Federal Communications Commission (FCC) fined the nation’s largest wireless carriers for illegally sharing access to customers’ location information without…