Threat intelligence: A blessing and a curse?

Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that security teams are blessed with an abundance of data... Read more »

Why CISOs face greater personal liability

In this Help Net Security interview, Christos Tulumba, CISO at Veritas Technologies, discusses the key factors contributing to increased personal liability risks for CISOs. These risks are driven by... Read more »

Practical strategies to mitigate risk and secure SAP environments

Large companies use ERP applications to manage business processes, including payroll and financial planning. This is precisely why bad actors are taking a renewed interest in these legacy systems... Read more »

Microsoft outages: The implications of downtime on the delivery of critical public services

Read more »

Airlines are flying blind on third-party risks

The aviation industry has traditionally focused on physical security threats, but recent revelations about risks on Boeing‘s supply chain have spotlighted the critical need to measure and mitigate supply... Read more »

Infosec products of the month: July 2024

Here’s a look at the most interesting products from the past month, featuring releases from: AttackIQ, AuditBoard, Black Kite, BlueVoyant, Druva, GitGuardian, Invicti Security, IT-Harvest, LogRhythm, LOKKER, NordVPN, Pentera,... Read more »

A ransomware attack disrupted operations at OneBlood blood bank

OneBlood, a non-profit blood bank serving over 300 U.S. hospitals, suffered a ransomware attack that disrupted its medical operations. OneBlood is a non-profit organization that provides blood and blood... Read more »

What is CrowdStrike? Everything You Need to Know

In this video, we delve into what CrowdStrike is, how its Falcon software works, and the recent update incident that impacted millions of Windows machines. Read more »

Microsoft Says Ransomware Groups Are Exploiting the Newly-Patched VMware ESXi Flaw

The CVE-2024-37085 vulnerability is present in ESXi hypervisors and can be used to deploy data-extortion malware. Read more »

Australian Organisations Experiencing Highest Rate of Data Breaches, Reports Rubrik

Rubrik research finds data breaches were 50% more common in Australia than the global average in 2023. Read more »
Subscribe to our Newsletter