0.7 C
Munich
Thursday, December 12, 2024

Articles

New ‘Digital Risk Protection’ Report from BrandShield Reveals Companies Lose $2.1M on Average to Each Online Attack 

The report surveyed 200 CISOs across the United States, United Kingdom, and Europe Only 6% of companies are reported to have avoided cyber attacks since...

Study Reveals: People, Process and Technology Challenges Limit Organizations’ Ability to Prevent Attacks

Tenable, the Exposure Management company, recently unveiled a comprehensive study that unveils the obstacles faced by cybersecurity and IT leaders as they strive to...

Why NIST included “Governance” in its CSF 2.0

The National Institute of Standards and Technology (NIST) has been at the forefront of promoting cybersecurity best practices and standards. One of its most...

Understanding Privilege Escalation in Information Security

Privilege escalation is one of the core concepts of information security. It refers to the type of attack where a user gains higher levels...

Microsoft Sheds Light On The “Octo Tempest” Threat Actor

In a recent release, Microsoft has provided an extensive analysis of a relatively obscure yet highly dangerous threat actor. In their report, Microsoft has designated...

Microsoft Launches Bug Bounty Program for AI-Powered Bing: Earn up to $15,000 for Reporting Vulnerabilities

In a proactive move to bolster the security of its innovative AI-powered Bing platform, Microsoft has unveiled a dedicated bug bounty program. This initiative...

Study: Key Trends and Challenges in Online Safety

Introduction In collaboration with the National Cybersecurity Alliance (NCA), CybSafe has recently conducted comprehensive research to delve into the evolving landscape of cybersecurity behaviors, attitudes,...

Data Transformation: Impact of Security Governance and Compliance

Data transformation occurs when raw data changes format, values, structure, or cleansing for human and computer interpretation to support organizational decision-making. Data risk and regulatory...

The Most Common Azure Security Misconfigurations

The rise of cloud environment usage especially Microsoft Azure, has also brought new challenges for CISOs and security professionals. Following best practices will help...

Understanding Security Risks in PDF Files

PDFs have become a universal format for sharing documents. However, threat actors have also recognized their potential as a vector for cyberattacks. In this...

Security Does Not Have To Be Expensive: Open-Source Tools for the Security Operation Center (SOC)

Tools don't make a good engineer, but a good engineer can become great with the right tools. Companies usually don't have the budget to establish...

29 Essential Tools Every InfoSec Professional Must Know

In the realm of information security and cybersecurity, having the right tools can make all the difference. In this article, we'll introduce you to...

Latest