Tag: EN

HPE is investigating claims of a new security breach

Hewlett Packard Enterprise (HPE) is investigating a new data breach after a threat actor claimed to have stolen data on a hacking forum. Hewlett Packard Enterprise (HPE) is investigating a new data breach, following the discovery of an offer on…

Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation

A recently disclosed server-side request forgery (SSRF) vulnerability impacting Ivanti Connect Secure and Policy Secure products has come under mass exploitation. The Shadowserver Foundation said it observed exploitation attempts originating from more than 170 unique IP addresses that aim to establish a…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […] The post The Tech Jobs That AI Will Not…

3 New Risks That CISOs Will Face in 2024

By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […] The post 3 New Risks That CISOs Will Face…

Five 5 benefits of having a cyber insurance cover on hand

In the age of digitization, securing IT assets through insurance coverage presents a challenge, particularly in convincing board members to allocate funds for cybersecurity. However, the investment yields significant benefits, as outlined below: Comprehensive Coverage: Cyber insurance shields businesses from…

3 ways to achieve crypto agility in a post-quantum world

Working at the speed of digital business is a constant challenge. But in today’s increasingly automated operational environment, crypto agility—i.e., an organization’s ability to (at the moment of compromise) switch rapidly and seamlessly between certificate authorities, encryption standards and keys…

How CISOs navigate policies and access across enterprises

In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a distributed enterprise. He also highlights the significance of security validations, especially…

10 must-read cybersecurity books for 2024

Our list of cybersecurity books has been curated to steer your professional growth in 2024. This selection aims to provide comprehensive information security insights and knowledge, ensuring you stay ahead in your career learning journey throughout the year. Cyber for…

Exploring NIST Cybersecurity Framework 2.0

In this Help Net Security video, Dan Erel, VP of Security at SeeMetrics, discusses NIST Cybersecurity Framework (CSF) 2.0. NIST CSF is based on existing standards, guidelines, and practices for organizations to manage and reduce cybersecurity risk better. It was…

Cybersecurity for E-commerce Websites: Protecting Customer Data

Your e-commerce website's cybersecurity is crucial for protecting customer data – discover the vulnerabilities and strategies to safeguard against threats. The post Cybersecurity for E-commerce Websites: Protecting Customer Data appeared first on Security Zap. This article has been indexed from…

Google throws $1M at Rust Foundation to build C++ bridges

Chocolate Factory matches Microsoft money for memory safety Google on Monday donated $1 million to the Rust Foundation specifically to improve interoperability between the language and C++.… This article has been indexed from The Register – Security Read the original…

The Role of Machine Learning in Cybersecurity

Machine learning is revolutionizing cybersecurity, offering organizations a powerful tool to stay ahead of evolving cyber threats. The post The Role of Machine Learning in Cybersecurity appeared first on Security Zap. This article has been indexed from Security Zap Read…