Please turn on your JavaScript for this page to function normally.
week in review
Week in review: High-severity OpenSSL vulnerabilities fixed, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: ConnectWise backup solutions open to RCE, patch ASAP! ConnectWise has fixed a …

patch
November 2022 Patch Tuesday forecast: Wrapping up loose ends?

October 2022 Patch Tuesday was a little unusual last month, as it ‘kind of’ repeated itself the following week. Microsoft turned around and released a series of non-security …

mobile device
Outmaneuvering cybercriminals by recognizing mobile phishing threats’ telltale markers

Preventative medicine has long been recognized as a vital approach in safeguarding our physical health. We take a variety of tests and assessments so that doctors can uncover …

USA
Privacy, compliance challenges businesses face after Roe v. Wade repeal

In this Help Net Security video, Rebecca Herold, IEEE member and CEO of Privacy & Security Brainiacs, discusses data, privacy, surveillance, and compliance challenges …

shark
The most frequently reported vulnerability types and severities

Bishop Fox collected and analyzed publicly disclosed reports from January to July 2022 to better understand the most frequently reported vulnerability types, the …

Election
The biggest threat to America’s election system? Ourselves

With midterm elections right around the corner, many Americans are questioning whether they can trust the election process. To be honest, this is fair, given the highly …

cloud storage
Top 4 priorities for cloud data protection

Recent BigID research found that 86% of organizations use multiple cloud platforms to store their data- across IaaS, PaaS, and SaaS. As the reliance on cloud services …

open source
Open-source software fosters innovation, but only with the right controls in place

In businesses of all sizes, open-source software is a crucial component of the software supply chain, but the OSS supply chain is also facing new security issues – calling for …

hands
Cybersecurity recovery is a process that starts long before a cyberattack occurs

While most organizations have insurance in case of cyberattacks, the premium they pay depends on how the business identifies, detects and responds to these attacks – and …

password
Businesses want technologies that allow for passwordless workflows

Bitwarden announced the results of its 2023 Password Decisions Survey, which polled 800 IT decision makers across a wide range of industries, showing that passwordless …

money
Group indicted for breaching CPA, tax preparation firms via stolen credentials

United States Attorney Roger B. Handberg announces the partial unsealing of an indictment charging eight individuals with Racketeer Influenced and Corrupt Organizations (RICO) …

drown
How to deal with burnout when you’re the CISO

CISOs are working overtime and can’t always switch off from work, according to a recent Tessian report. Recent headlines have shown that security stakes have never been …

Don't miss

Cybersecurity news