Please turn on your JavaScript for this page to function normally.
vulnerability
Organizations’ serious commitment to software risk management pays off

There has been a significant decrease in vulnerabilities found in target applications – from 97% in 2020 to 83% in 2022 – an encouraging sign that code reviews, automated …

brain
The hidden obstacles to integrating AI into your business

A mere 14% of organizations globally are fully prepared to deploy and leverage AI-powered technologies, according to Cisco. The report highlights companies’ preparedness …

Sophos
Sophos Web Appliance vulnerability exploited in the wild (CVE-2023-1671)

CISA has added three vulnerabilities to its Known Exploited Vulnerabilities catalog, among them a critical vulnerability (CVE-2023-1671) in Sophos Web Appliance that has been …

black friday cybersecurity
9 Black Friday cybersecurity deals you don’t want to miss

PortDroid PortDroid is a trusted app for all network analysis tasks. Designed with network administrators, penetration testers, and technology enthusiasts in mind, this app …

work
How effective compensation makes a difference with cyber talent retention

Aligning cybersecurity organization models with business objectives enables talent retention and security program success, according to IANS and Artico Search. CISOs’ …

GenAI
Smaller businesses embrace GenAI, overlook security measures

Organizations are feeling the pressure to rush into generative AI (GenAI) tool usage, despite significant security concerns, according to Zscaler. More than 900 global IT …

data analytics
Only 9% of IT budgets are dedicated to security

Despite their best efforts, 67% of businesses say they need to improve security and compliance measures with 24% rating their organization’s security and compliance strategy …

week in review
Week in review: Juniper devices compromised, great corporate security blogs, MITRE D3FEND

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The real cost of healthcare cybersecurity breaches In this Help Net Security …

cyber war readiness
Why cyber war readiness is critical for democracies

Once the war in Ukraine ends, Russia’s offensive cyber capabilities will be directed towards other targets, Rik Ferguson, VP Security Intelligence for Forescout, …

Audit
Internal audit leaders are wary of key tech investments

As the digital transformation of business accelerates, risk and internal audit leaders shift their focus to managing technology-driven risk, according to AuditBoard. The …

Wireshark
Wireshark 4.2.0 released, open-source packet analysis gets even better

Wireshark, the popular network protocol analyzer, has reached version 4.2.0. Wireshark 4.2.0: Notable changes Wireshark supports dark mode on Windows. Packet list sorting has …

New infosec products of the week
New infosec products of the week: November 17, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Devo Technology, Illumio, Kasada, Lacework, OneSpan, and ThreatModeler. OneSpan …

Don't miss

Cybersecurity news