Please turn on your JavaScript for this page to function normally.
Jason R.C. Nurse
Adapting higher education to address the cybersecurity skills shortage

In this Help Net Security interview, Dr. Jason R.C. Nurse, Associate Professor in Cyber Security in the School of Computing and the Institute of Cyber Security for Society …

people
CIS Benchmarks communities: Where configurations meet consensus

Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. That’s not the …

Kafdrop
Kafdrop flaw allows data from Kafka clusters to be exposed Internet-wide

Researchers at Spectral discovered a security flaw in Kafdrop, a popular open-source UI and management interface for Apache Kafka clusters that has been downloaded more than …

industrial robot
Making robotics security a top priority

Competition in the industrial robotics market is heating up, with worldwide investment expected to reach $210 billion by 2025 – more than double the amount in 2020. …

2022
2022 and the threat landscape: The top 5 future cybersecurity challenges

Digital adoption has rapidly accelerated and as a result, the threat surface has also expanded. As we look ahead to 2022, there will be new and evolving cybersecurity …

Acra
Acra: Open-source database protection with field-level encryption and intrusion detection

Cossack Labs updated its flagship open-source product Acra database security suite to version 0.90.0 and made many of its core security features previously available only for …

train
Railway cyber risk management: Raising awareness on relevant threats

ENISA has announced the release of its report – Railway Cybersecurity – Good Practices in Cyber Risk Management for railway organizations. European railway undertakings …

Tal Steinherz
API security awareness: The first step to better assessing the risk

In this Help Net Security interview, Tal Steinherz, CTO at Wib, talks about the importance of API security awareness and how to tackle numerous threats that are plaguing it. …

bomb
Control failures are behind a growing number of cybersecurity incidents

Data from a survey of 1,200 enterprise security leaders reveals that an increase in tools and manual reporting combined with control failures are contributing to the success …

lock
Implications of strengthening the cybersecurity of small business in America

On November 2, 2021, the House of Representatives passed two bills with the goal of strengthening the cybersecurity of small businesses in America. The first bill, the Small …

shark
Most challenging security threats for CTOs

59% of CTOs still see human error as the main security threat to their business, alongside other prominent concerns such as ransomware (49%) and phishing (36%), a research …

lock
Secure cloud products and services with new CIS Benchmarks

The cloud continues to expand with new products and services constantly introduced by cloud service providers (CSPs). The Center for Internet Security (CIS) responded with …

Don't miss

Cybersecurity news