Please turn on your JavaScript for this page to function normally.
Australia
A closer look at the 2023-2030 Australian Cyber Security Strategy

In this Help Net Security video, David Cottingham, CEO of Airlock Digital, discusses the 2023-2030 Australian Cyber Security Strategy and reviews joint and individual …

cyber risks
Why AI-enhanced threats and legal uncertainty are top of mind for risk executives

AI-enhanced malicious attacks are the top emerging risk for enterprises in the third quarter of 2024, according to Gartner. Key emerging risks for enterprises It’s the third …

Infosec products of the week
New infosec products of the week: November 8, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Atakama, Authlete, Symbiotic Security, and Zywave. Atakama introduces DNS filtering …

AWS
AWS security essentials for managing compliance, data protection, and threat detection

AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within their environments. From AWS …

data privacy
Consumer privacy risks of data aggregation: What should organizations do?

In September 2024, the Federal Trade Commission (FTC) released an eye-opening report that digs into the data habits of nine major tech giants, including Amazon (Twitch), …

Osmedeus
Osmedeus: Open-source workflow engine for offensive security

Osmedeus is an open-source workflow engine designed for offensive security. It serves as a versatile foundation, enabling users to easily create customized reconnaissance …

predictions
Key cybersecurity predictions for 2025

In this Help Net Security video, Chris Gibson, CEO at FIRST, discusses the evolving threat landscape and provides a unique take on where data breaches and cyber attacks will …

video data breaches
Identity-related data breaches cost more than average incidents

Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related security breach. Of …

Voice of Practitioners 2024
Report: Voice of Practitioners 2024 – The True State of Secrets Security

In this study, GitGuardian and CyberArk reveal the stark reality of secrets management across 1,000 organizations. With 79% experiencing secrets leaks and an average …

open source
Open-source software: A first attempt at organization after CRA

The open-source software (OSS) industry is developing the core software for the global infrastructure, to the point that even some proprietary software giants adopt Linux …

breach
AI learning mechanisms may lead to increase in codebase leaks

The proliferation of non-human identities and the complexity of modern application architectures have created significant security challenges, particularly in managing …

lock
Cybersecurity in crisis: Are we ready for what’s coming?

In this Help Net Security video, James Edgar, CISO at Corpay, reveals insights into cybersecurity health, concerns, challenges, and other considerations for building a solid …

Cybersecurity news