Hiring guide: Key skills for cybersecurity researchers

In this Help Net Security interview, Rachel Barouch, an Organizational Coach for VCs and startups and a former VP HR in both a VC and a Cybersecurity startup, discusses the dynamics of cybersecurity researchers and team-building strategies. She highlig… Continue reading Hiring guide: Key skills for cybersecurity researchers

Cybersecurity in crisis: Are we ready for what’s coming?

In this Help Net Security video, James Edgar, CISO at Corpay, reveals insights into cybersecurity health, concerns, challenges, and other considerations for building a solid defense program. Key insights revealed in Corpay’s 2024 State of Busines… Continue reading Cybersecurity in crisis: Are we ready for what’s coming?

Strong privacy laws boost confidence in sharing information with AI

53% of consumers report being aware of their national privacy laws, a 17-percentage point increase compared to 2019, according to Cisco. Informed consumers are also much more likely to feel their data is protected (81%) compared to those who are unawar… Continue reading Strong privacy laws boost confidence in sharing information with AI

Georgia Secretary of State: Haitian immigrant voting video is likely Russian disinformation

CISA is investigating the incident, and Georgia’s top election official specifically lobbied Elon Musk to remove the post from X.

The post Georgia Secretary of State: Haitian immigrant voting video is likely Russian disinformation appeared first on CyberScoop.

Continue reading Georgia Secretary of State: Haitian immigrant voting video is likely Russian disinformation

50% of financial orgs have high-severity security flaws in their apps

Security debt, defined for this report as flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt, according to Veracode. Financial sec… Continue reading 50% of financial orgs have high-severity security flaws in their apps

How open-source MDM solutions simplify cross-platform device management

In this Help Net Security interview, Mike McNeil, CEO at Fleet, talks about the security risks posed by unmanaged mobile devices and how mobile device management (MDM) solutions help address them. He also discusses employee resistance to MDM and how op… Continue reading How open-source MDM solutions simplify cross-platform device management

Threat actors are stepping up their tactics to bypass email protections

Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass these systems. With the development of AI technology, phishing is becoming increasingly difficult to recog… Continue reading Threat actors are stepping up their tactics to bypass email protections