How executives adapt to rising cybersecurity concerns in mobile networks

In this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in network operators as they struggle to protect consumers from sophisticated (usual… Continue reading How executives adapt to rising cybersecurity concerns in mobile networks

Creating a formula for effective vulnerability prioritization

In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. Gorelik discusses challenges posed by regulatory frameworks, incomplete asset inventorie… Continue reading Creating a formula for effective vulnerability prioritization

MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure

MITRE and partners unveil EMB3D, a new threat model designed for critical infrastructure embedded devices.
The post MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure appeared first on SecurityWeek.
Continue reading MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure

Shifting data protection regulations show why businesses must put privacy at their core

Like it or not, data protection will be one of the biggest issues organizations face in 2024. Knowing where to focus compliance efforts will be tricky, with more and more state-level privacy laws becoming effective in the US, creating a patchwork of di… Continue reading Shifting data protection regulations show why businesses must put privacy at their core

eIDAS: EU’s internet reforms will undermine a decade of advances in online security

The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as eIDAS 2.0 – contains legislation that poses a grave threat to online privacy and security. An article buried deep in the draft t… Continue reading eIDAS: EU’s internet reforms will undermine a decade of advances in online security

AI disinformation campaigns pose major threat to 2024 elections

AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As the world emerged from the pandemic and continued to adapt to the rapid implem… Continue reading AI disinformation campaigns pose major threat to 2024 elections

Modeling organizations’ defensive mechanisms with MITRE D3FEND

Funded by the National Security Agency, MITRE’s D3FEND framework is helping to provide standardization, specificity, and repeatability needed by cybersecurity engineers. As the framework moves from the beta version to version 1.0 in 2024, we asked D3FE… Continue reading Modeling organizations’ defensive mechanisms with MITRE D3FEND

Collaborative strategies are key to enhanced ICS security

In this Help Net Security interview, Marko Gulan, Cyber Security Consultant at Schneider Electric, discusses the complexities of safeguarding industrial control systems (ICS). Our conversation will explore the importance of cross-departmental collabora… Continue reading Collaborative strategies are key to enhanced ICS security

CISOs vs. developers: A battle over security priorities

A majority of both developers and CISOs view software supply chain security as a top priority in their roles (70% and 52% respectively), according to Chainguard. However, there is a clear disconnect and even some distrust between CISOs and developers r… Continue reading CISOs vs. developers: A battle over security priorities