Please turn on your JavaScript for this page to function normally.
cybersecurity week in review
Week in review: Fortinet patches critical FortiManager 0-day, VMware fixes vCenter Server RCE

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Fortinet releases patches for publicly undisclosed critical FortiManager …

SEC
SEC fines tech companies for misleading SolarWinds disclosures

The Securities and Exchange Commission charged four current and former public companies – Unisys Corp., Avaya Holdings Corp., Check Point Software Technologies Ltd, and …

cyber resilience
Achieving peak cyber resilience

Climbing Mount Everest isn’t a feat for the faint hearted. Extreme weather, dangerous terrain and acclimatization requirements make the trek challenging for even the most …

quantum computing
How to fend off a quantum computer attack

In this Help Net Security video, IEEE member Marc Lijour explains quantum computing and offers insight into how to fend off a quantum computer attack.

insider threat
Unclear pricing for GRC tools creates market confusion

Due to widely varying government, risk, and compliance (GRC) tool pricing, enterprise risk management (ERM) leaders must understand four different pricing-tier categories of …

Infosec products of the week
New infosec products of the week: October 25, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Fastly, IBM, Ivanti, Kusari, and Nucleus Security. IBM Guardium Data Security Center …

certificates
What’s more important when hiring for cybersecurity roles?

When building a cybersecurity team, you likely asked yourself, “Should I focus on certifications or real-world skills?” And since you rarely encounter entry-level candidates …

cyber insurance
Facing the uncertainty of cyber insurance claims

Cyber insurance is vital for companies mitigating cyber risks, but the industry still encounters significant challenges, including shifting policy requirements and uncertainty …

face
AI and deepfakes fuel phishing scams, making detection harder

AI impersonation is now the hardest vector for cybersecurity professionals to protect companies against, according to Teleport. The study, which surveyed 250 senior US and UK …

Google Chrome
How to enable Safe Browsing in Google Chrome on Android

To safeguard your data, Google Chrome uses Safe Browsing to protect you from: harmful websites and extensions, malicious or intrusive advertisements, malware, phishing …

Argus
Argus: Open-source information gathering toolkit

Argus is an open-source toolkit that simplifies information gathering and reconnaissance. It features a user-friendly interface and a collection of powerful modules, enabling …

cloud
Evolving cloud threats: Insights and recommendations

Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by …

Don't miss

Cybersecurity news