Strategies for secure identity management in hybrid environmentsIn this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments.
Leveraging AI for enhanced compliance and governanceIn this Help Net Security interview, Dr. Joseph Sweeney, Advisor at IBRS, discusses the risks of integrating AI into information management systems.
Strategies to cultivate collaboration between NetOps and SecOpsIn this Help Net Security interview, Debby Briggs, CISO at Netscout, discusses breaking down silos between NetOps and SecOps.
Cybersecurity jobs available right now: April 10, 2024We've scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field.
It can handle almost anything, and someone once called it the kitchen sink of PKI. Microsoft patches two actively exploited zero-daysOn this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn't marked as exploited, but Peter Girnus, senior threat researcher with Trend Micro's Zero Day Initiative, has found being leveraged by attackers in the wild.
It enables teams to collect, store, and analyze data to get answers to security, application, and IT infrastructure questions.
WiCyS: A champion for a more diverse cybersecurity workforceIn this Help Net Security interview, Lynn Dohm, Executive Director at Women in CyberSecurity, talks about how the organization supports its members across different stages of their cybersecurity journey.
XZ Utils backdoor: Detection tools, scripts, rulesAs the analysis of the backdoor in XZ Utils continues, several security companies have provided tools and advice on how to detect its presence on Linux systems.
New Google Workspace feature prevents sensitive security changes if two admins don't approve themGoogle is rolling out multi-party approvals for Google Workspace customers with multiple super admin accounts, the company has announced.
LG smart TVs may be taken over by remote attackersBitdefender researchers have uncovered four vulnerabilities in webOS, the operating system running on LG smart TVs, which may offer attackers unrestricted access to the devices.
New covert SharePoint data exfiltration techniques revealedVaronis Threat Labs researchers have uncovered two techniques attackers can use can use for covert data and file exfiltration from companies' SharePoint server.
How malicious email campaigns continue to slip through the cracksIn this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form of communication within a business.
April 2024 Patch Tuesday forecast: New and old from MicrosoftThis month, we have a new product preview from Microsoft, and some older products are being prepared for end-of-support.
Defining a holistic GRC strategyIn this Help Net Security video, Nicholas Kathmann, CISO at LogicGate, discusses why companies are turning to a holistic GRC strategy.
How exposure management elevates cyber resilienceAttackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset identification and understand their assets' security posture in relation to the whole estate.
AI risks under the auditor's lens more than everIn this Help Net Security video, Thomas Teravainen, a Research Specialist at Gartner, discusses how AI-related risks have seen the biggest increases in audit plan coverage in 2024.
Stopping security breaches by managing AppSec postureIn this Help Net Security video, Gopi Rebala, CTO at OpsMx, talks about how managing application security posture can help companies identify, prioritize, and fix vulnerabilities and stop security breaches while enforcing policies to block vulnerable deployments to production environments.
How Google's 90-day TLS certificate validity proposal will affect enterprisesAnnounced last year, Google's proposal to reduce the lifespan of TLS certificates from 13 months to 90 days could be implemented in the near future.
It will certainly improve security and shrink the window of opportunity for bad actors to exploit compromised or stolen certificates and private keys.
The next wave of mobile threatsIn this Help Net Security video, Michael Covington, VP of Portfolio Strategy at Jamf, discusses planning a mobile security strategy.
This Cyber News was published on www.helpnetsecurity.com. Publication date: Sun, 14 Apr 2024 08:43:06 +0000