Help Net Security
Week in review: Kali Linux 2021.2, the human cost of understaffed SOCs, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2021.2 released: Kaboxer, Kali-Tweaks, new tools, and more! Offensive …
Critical vulnerabilities identified in CODESYS ICS automation software
Researchers have identified 10 vulnerabilities in CODESYS automation software for industrial control systems. Some are of high and critical severity. “The vendor rated …
June 2021 Patch Tuesday forecast: Patch management is back in the spotlight
Every day you look in the security news, there are reports of new ransomware attacks. Just after May Patch Tuesday we heard about the Colonial Pipeline attack, and this week …
Quantum computing: How should cybersecurity teams prepare for it?
The late Field-Marshall Archibald Wavell wrote of the Malayan Campaign, “The story (…) is typical of the British way of war, and therefore begins with a complete lack of …
Changes in the privacy landscape through the pandemic
The pandemic has turned the way businesses operate upside down. In the rush to keep the lights on, businesses pivoted online to keep sales up and maintain customer services. …
What happens after a malicious email reaches employees’ inboxes?
On average, it takes three and half days (83 hours) from the moment a malicious email attack lands in an employees inbox, to when it is discovered by a security team or …
Higher encryption adoption driven by rising data breach threats
Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …
Cyberattacks target the anywhere workforce, legacy security systems can’t provide protection
VMware released a report based on an online survey of 3,542 CIOs, CTOs and CISOs in December 2020 from across the globe. The report explores the impact of cyberattacks and …
Future of work driven by employees having the ability to work anywhere
While many business leaders are drawn to vaccine passports as a solution to bring their workforces back to the office full-time, Forrester predicts that 70% of US and European …
CIS Community Defense Model v2.0 is coming this summer
Changes and advances in technology (and changes in workplace circumstances) have prompted a revamp of the CIS Community Defense Model (CDM). Set to go live in a few months, …
Reimagining enterprise cryptography: How to regain control in a fragmented environment
Cryptography has been on a significant journey over the past two decades. Its role in securing the digital world of 20 years ago was very different to its role in the modern …
Making transparency a norm in cybersecurity
The general lack of transparency around cybersecurity continues to be one of the largest factors holding back the combined ability of the public and private sector to truly …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts