![ChatGPT](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/04123002/chatgpt-future-400x200.jpg)
Blocking access to ChatGPT is a short term solution to mitigate risk
For every 10,000 enterprise users, an enterprise organization is experiencing approximately 183 incidents of sensitive data being posted to ChatGPT per month, according to …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/20151654/zero_trust-400x200.jpg)
CISOs consider zero trust a hot security ticket
The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102709/patch-400x200.jpg)
A step-by-step guide for patching software vulnerabilities
Coalition’s recent Cyber Threat Index 2023 predicts the average Common Vulnerabilities and Exposures (CVEs) rate will rise by 13% over 2022 to more than 1,900 per month in …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
Why are computer security guidelines so confusing?
If you find the computer security guidelines you get at work confusing and not very useful, you’re not alone. A new study highlights a key problem with how these guidelines …
![Oliver Rochford](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/17121843/oliver_rochford-2-tenzir-400x200.jpg)
Key factors for effective security automation
Harnessing the potential of automation in cybersecurity is key to maintaining a robust defense against ever-evolving threats. Still, this approach comes with its own unique …
![Unix-like Artifacts Collector (UAC)](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/21085505/unc-1200-400x200.jpg)
UAC: Live response collection script for incident response
Unix-like Artifacts Collector (UAC) is a live response collection script for incident response that makes use of native binaries and tools to automate the collection of AIX, …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10161518/laptop-fire3-400x200.png)
Cryptojacking soars as cyberattacks increase, diversify
Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according to SonicWall. Overall …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/24144150/usa-flag-1-400x200.jpg)
SEC adopts new cybersecurity incident disclosure rules for companies
The Securities and Exchange Commission (SEC) today adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an …
![Mikrotik](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/26130436/mikrotik1-400x200.jpg)
MikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799)
A privilege escalation vulnerability (CVE-2023-30799) could allow attackers to commandeer up to 900,000 MikroTik routers, says VulnCheck researcher Jacob Baines. While …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
Enterprises should layer-up security to avoid legal repercussions
The role of CISO these days requires a strong moral compass: You have to be the one speaking up for the protection of customer data and be ready to handle uncomfortable …
![Lindsey Polley de Lopez](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/12134457/dr.lindsey_polley_de_lopez-2-mach37-400x200.jpg)
Overcoming the cybersecurity talent shortage with upskilling initiatives
In this Help Net Security interview, Dr. Lindsey Polley de Lopez, Director of Cyber & Space Intelligence at MACH37, proposes strategies for companies, educational …
![Stellar Toolkit for Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/23161304/stellar-toolkit-for-exchange-1200-400x200.jpg)
Product showcase: Stellar Toolkit for Exchange – Restore Exchange Database
Time is of the essence when it comes to recovery after Exchange Server failure or database corruption, as organizations depend on emails for their day-to-day business …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history