Please turn on your JavaScript for this page to function normally.
GenAI
How AI affects vulnerability management in open-source software

In this Help Net Security video, Itamar Sher, CEO of Seal Security, discusses how AI affects the risk and operational aspects of managing vulnerabilities in open-source …

vulnerability
Critical vulnerabilities take 4.5 months on average to remediate

Over a third of organizations had at least one known vulnerability in 2023, with nearly a quarter of those facing five or more, and 60% of vulnerabilities remained unaddressed …

cybersecurity education
Securing the future through cybersecurity education

In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about the cybersecurity talent shortage and the role …

Ultimate CISSP Guide
Download: The Ultimate Guide to the CISSP

The Ultimate Guide to the CISSP covers everything you need about the world’s premier cybersecurity leadership certification. Learn how CISSP and ISC2 will help you navigate …

cybersecurity week in review
Week in review: Veeam fixes RCE flaw in backup management platform, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam fixes RCE flaw in backup management platform (CVE-2024-29212) Veeam has …

patch tuesday
May 2024 Patch Tuesday forecast: A reminder of recent threats and impact

The updates have been released: May 2024 Patch Tuesday: Microsoft fixes exploited zero-days (CVE-2024-30051, CVE-2024-30040) The thunderstorms of April patches have passed, …

passwords
How secure is the “Password Protection” on your files and drives?

People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate …

vulnerabilities
Cybercriminals are getting faster at exploiting vulnerabilities

Cybercriminals are targeting the ever-increasing number of new vulnerabilities resulting from the exponential growth in the number and variety of connected devices and an …

Nmap
Nmap 7.95 released: New OS and service detection signatures

Nmap is a free, open-source tool for network discovery and security auditing. It’s valued by systems and network administrators for network inventory, managing service …

GenAI
GenAI enables cybersecurity leaders to hire more entry-level talent

93% of security leaders said public GenAI was in use across their respective organizations, and 91% reported using GenAI specifically for cybersecurity operations, according …

biometrics
Selfie spoofing becomes popular identity document fraud technique

Document image-of-image was the most prevalent identity (ID) document fraud technique in 2023, occurring in 63% of all IDs that were rejected, according to Socure. Selfie …

Infosec products of the week
New infosec products of the week: May 10, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, AuditBoard, Cranium, Datadog, Eclypsium, ExtraHop, Forcepoint, …

Don't miss

Cybersecurity news