Identity-related data breaches cost more than average incidents

Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related security breach. Of those, 66% reported it as a severe event that affected their organization. 4… Continue reading Identity-related data breaches cost more than average incidents

Schneider Electric reports cyberattack, its third incident in 18 months

The ransomware group HellCat claims responsibility for the cyberattack and threatens to dump 40GB.

The post Schneider Electric reports cyberattack, its third incident in 18 months appeared first on CyberScoop.

Continue reading Schneider Electric reports cyberattack, its third incident in 18 months

Open-source software: A first attempt at organization after CRA

The open-source software (OSS) industry is developing the core software for the global infrastructure, to the point that even some proprietary software giants adopt Linux servers for their cloud services. Still, it has never been able to get organized … Continue reading Open-source software: A first attempt at organization after CRA

Maximizing security visibility on a budget

In this Help Net Security interview, Barry Mainz, CEO at Forescout, discusses the obstacles organizations encounter in attaining security visibility, particularly within cloud and hybrid environments. He explains why asset intelligence—going beyond bas… Continue reading Maximizing security visibility on a budget

AI learning mechanisms may lead to increase in codebase leaks

The proliferation of non-human identities and the complexity of modern application architectures has created significant security challenges, particularly in managing sensitive credentials, according to GitGuardian. Based on a survey of 1,000 IT decisi… Continue reading AI learning mechanisms may lead to increase in codebase leaks