10 free cybersecurity guides you might have missed
This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and…
This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and…
Mar 11, 2024NewsroomNetwork Security / Vulnerability Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in…
A recent security report from Lithuania highlights a concerning increase in Russian influence operations targeting the Baltic States and Poland. These campaigns are noted for…
COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding a new value on a…
With the rapid proliferation of mobile applications across various industries, ensuring the security of these apps has become paramount. Mobile application security testing is a…
In this Help Net Security interview, Omkhar Arasaratnam, General Manager at the Open Source Security Foundation (OpenSSF), discusses the evolution of memory-safe programming languages and…
In a recent statement, Microsoft, the American software behemoth, has raised concerns over the presence of Russian state-funded hackers within its corporate network. Despite affirming…
97% of technology leaders find traditional AIOps models are unable to tackle the data overload, according to Dynatrace. Organizations are drowning in data The research…
The creation of NTT DATA has brought together the capabilities, services and talents of NTT DATA and NTT Ltd. around the world to form a…
Qantas has appointed Andre Walduck as its new group chief information officer and made Matt Biber its permanent group chief information security officer. Both Walduck…
As the threat landscape has evolved with new malicious actors employing increasingly effective tools, techniques and procedures we’ve seen a burgeoning number of security standards…
CBA will work more closely with Microsoft in the areas of generative AI and cyber security under an expanded partnership agreement. Group CIO and group…