Organizations overwhelmed by numerous and insecure remote access tools

Organizations are combating excessive remote access demands with an equally excessive number of tools that provide varying degrees of security, according to Claroty. Data from more than 50,000 remote-access-enabled devices showed that the volume of rem… Continue reading Organizations overwhelmed by numerous and insecure remote access tools

What can businesses learn from the rise of cyber espionage?

It’s not just government organizations that need to worry about cyber espionage campaigns — the entire business world is also a target. Multipolarity has been a defining trend in geopolitics in recent years. Rivalries between the world’s great powers continue to test the limits of globalism, resulting in growing disruption to international supply chains and […]

The post What can businesses learn from the rise of cyber espionage? appeared first on Security Intelligence.

Continue reading What can businesses learn from the rise of cyber espionage?

The future of automotive cybersecurity: Treating vehicles as endpoints

The automotive industry is facing many of the same cybersecurity risks and threats that successful organizations in other sectors are up against, but it’s also battling some distinct ones. In this Help Net Security interview, Josh Smith, Principal Thre… Continue reading The future of automotive cybersecurity: Treating vehicles as endpoints

CISOs list human error as their top cybersecurity risk

With cybersecurity, the focus often is on technology — specifically, how cyber criminals use it to conduct attacks and the tools that organizations can use to keep their systems and data safe. However, this overlooks the most important element in cybersecurity risk: human error. Human risk in cybersecurity Proofpoint’s 2024 Voice of the CISO report […]

The post CISOs list human error as their top cybersecurity risk appeared first on Security Intelligence.

Continue reading CISOs list human error as their top cybersecurity risk

Researchers expose GitHub Actions workflows as risky and exploitable

GitHub is an immensely popular platform, with over 100 million developers and over 90% of Fortune 100 companies utilizing it. Despite its widespread use, many GitHub Actions workflows remain insecure, often due to excessive privileges or high-risk depe… Continue reading Researchers expose GitHub Actions workflows as risky and exploitable

Cyber insurance 2.0: The systemic changes required for future security

Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. In this Help Net Security video, Vishaal Hariprasad, CEO at Resilience, discus… Continue reading Cyber insurance 2.0: The systemic changes required for future security

Most GitHub Actions workflows are insecure in some way

Most GitHub Actions are susceptible to exploitation; they are overly privileged or have risky dependencies, according to Legit Security. GitHub Actions security flaws pose major risks The report found the GitHub Actions marketplace’s security posture t… Continue reading Most GitHub Actions workflows are insecure in some way

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices

Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff Research Engineer at Endor Labs, discusses why it causes issues and how it should be… Continue reading Shadow engineering exposed: Addressing the risks of unauthorized engineering practices

Organizations use outdated approaches to secure APIs

Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites, according to Cloudflare. The report underscores that the volume of threats… Continue reading Organizations use outdated approaches to secure APIs