![cyber war readiness](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/17115230/cyber_war_readiness2-400x200.jpg)
Why cyber war readiness is critical for democracies
Once the war in Ukraine ends, Russia’s offensive cyber capabilities will be directed towards other targets, Rik Ferguson, VP Security Intelligence for Forescout, …
![Audit](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/04145232/audit-400x200.jpg)
Internal audit leaders are wary of key tech investments
As the digital transformation of business accelerates, risk and internal audit leaders shift their focus to managing technology-driven risk, according to AuditBoard. The …
![Wireshark](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/17091650/wireshark-2023-400x200.jpg)
Wireshark 4.2.0 released, open-source packet analysis gets even better
Wireshark, the popular network protocol analyzer, has reached version 4.2.0. Wireshark 4.2.0: Notable changes Wireshark supports dark mode on Windows. Packet list sorting has …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: November 17, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Devo Technology, Illumio, Kasada, Lacework, OneSpan, and ThreatModeler. OneSpan …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142723/cloudfiles1-400x200.jpg)
Traditional cloud security isn’t up to the task
In the last year, 47% of all data breaches originated in the cloud, and more than 6 in 10 respondents believe cloud security is lacking and poses a severe risk to their …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101936/spotlight-400x200.jpeg)
AI disinformation campaigns pose major threat to 2024 elections
AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As …
![ai investments](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/13123650/ai_investments-400x200.jpg)
ChatGPT’s popularity triggers global generative AI investment surge
While AI is not a new technology – companies have been investing heavily in predictive and interpretive AI for years – the announcement of the GPT-3.5 series from OpenAI in …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101941/genai3-400x200.jpg)
Rise in automated attacks troubles ecommerce industry
Automated attacks on application business logic, carried out by sophisticated bad bots, were the leading threat for online retailers, according to Imperva. In addition, …
![IRISSCON 2023](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/16145405/irisscon2023-1600-400x200.jpg)
Photos: IRISSCON 2023
IRISSCON, the annual cybercrime-themed conference organized by the Irish Reporting and Information Security Service (IRISS), was held in Dublin, Ireland, on November 16, 2023. …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11092828/lock-computer-blue-400x200.jpg)
From PKI to PQC: Devising a strategy for the transition
Quantum computers capable of breaking currently used encryption algorithms are an inevitability. And since the US, China and Europe are sprinting to win that arms race, we …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143233/cyber-threat2-400x200.jpg)
Telemetry gaps leave networks vulnerable as attackers move faster
Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide …
![Cyberbunker](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/14095432/cyberbunker-400x200.jpg)
Review: Cyberbunker: The Criminal Underworld
Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that enabled the proliferation of dark web forums where …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?