Please turn on your JavaScript for this page to function normally.
security
Overlooking platform security weakens long-term cybersecurity posture

Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. …

open-source software
70% of open-source components are poorly or no longer maintained

The geographic distribution of open-source contributions introduces geopolitical risks that organizations must urgently consider, especially with rising nation-state attacks, …

work
65% of office workers bypass cybersecurity to boost productivity

High-risk access exists throughout the workplace, in almost every job role, proving that the time has come for organizations to re-think the way they protect their workforce, …

AI
Using AI to drive cybersecurity risk scoring systems

In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for …

AI
How human ingenuity continues to outpace automated security tools

10% of security researchers now specialize in AI technology as 48% of security leaders consider AI to be one of the greatest risks to their organizations, according to …

cyber risks
Why AI-enhanced threats and legal uncertainty are top of mind for risk executives

AI-enhanced malicious attacks are the top emerging risk for enterprises in the third quarter of 2024, according to Gartner. Key emerging risks for enterprises It’s the third …

healthcare
6 key elements for building a healthcare cybersecurity response plan

Medical practices remain vulnerable to cyberattacks, with over a third unable to cite a cybersecurity incident response plan, according to Software Advice. This gap exposes …

SEC
SEC fines tech companies for misleading SolarWinds disclosures

The Securities and Exchange Commission charged four current and former public companies – Unisys Corp., Avaya Holdings Corp., Check Point Software Technologies Ltd, and …

passwords
The most common authentication method is also the least secure

Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and …

cyber threat
Companies mentioned on the dark web at higher risk for cyber attacks

The presence of any data relating to an organization on the dark web demonstrably increases its risk of a cyber attack, according to Searchlight Cyber. Dark web insights and …

arrows
Organizations are changing cybersecurity providers in wake of Crowdstrike outage

More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber …

industry
Organizations overwhelmed by numerous and insecure remote access tools

Organizations are combating excessive remote access demands with an equally excessive number of tools that provide varying degrees of security, according to Claroty. Data from …

Don't miss

Cybersecurity news