IBM Consulting partners with Microsoft to help clients modernize security operations

IBM Consulting and Microsoft announce strengthened cybersecurity collaboration to help clients simplify and modernize their security operations, and manage and protect their hybrid cloud identities. As organizations embrace hybrid... Read more »

Security Think Tank: Securing today’s ubiquitous cloud environment

Read more »

China-linked APT exploited Cisco NX-OS zero-day to deploy custom malware

Cisco fixed an actively exploited NX-OS zero-day, the flaw was exploited to install previously unknown malware as root on vulnerable switches. Cisco addressed an NX-OS zero-day, tracked as CVE-2024-20399... Read more »

Leveraging no-code automation for efficient network operations

In this Help Net Security interview, Lingping Gao, CEO at NetBrain, discusses the challenges NetOps teams face in maintaining production services due to outdated processes and growing infrastructures. No-code... Read more »

The impossibility of “getting ahead” in cyber defense

As a security professional, it can be tempting to believe that with sufficient resources we can achieve of state of parity, or even relative dominance, over cyber attackers. After... Read more »

Inside the minds of CISOs

In this Help Net Security video, Nick McKenzie, CISO of Bugcrowd, discusses the key findings from their recent report, which comes at a crucial time as security leaders’ roles... Read more »

Deepfakes and voice clones are undermining election integrity

As the volume of digital business rises year over year, the potential for AI-enhanced digital fraud increases with it, according to TeleSign. A new TeleSign report highlights consumer concerns... Read more »

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

Analysts found that 52% of open-source projects are written in memory-unsafe languages like C and C++. Read more »

Critical unauthenticated remote code execution flaw in OpenSSH server

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code execution with root privileges in glibc-based Linux systems. OpenSSH maintainers addressed a critical vulnerability,... Read more »

SCYTHE 4.3 enables organizations to test and validate their defenses

SCYTHE has announced SCYTHE 4.3, which brings a host of enhancements designed to support and advance cybersecurity teams’ capabilities in threat emulation, vulnerability management, and security integration. SCYTHE 4.3... Read more »
Subscribe to our Newsletter