This Week in Security: IOCONTROL, (Location) Leaking Cars, and Passkeys

Claroty’s TEAM82 has a report on a new malware strain, what they’re calling IOCONTROL. It’s a Linux malware strain aimed squarely at embedded devices. One of the first targets of …read more Continue reading This Week in Security: IOCONTROL, (Location) Leaking Cars, and Passkeys

The modern CISO is a cornerstone of organizational success

The chief information security officer (CISO) role has undergone a remarkable transformation, evolving from a purely technical position to a role that bridges business strategy, operational efficiency, and cybersecurity.
The post The modern CISO is a c… Continue reading The modern CISO is a cornerstone of organizational success

Best practices for ensuring a secure browsing environment

In this Help Net Security interview, Devin Ertel, CISO at Menlo Security, discusses how innovations like AI and closer collaboration between browser vendors and security providers will shape the future of browser security.
The post Best practices for e… Continue reading Best practices for ensuring a secure browsing environment

Every minute, 4,080 records are compromised in data breaches

A recent Domo report shows that the world’s internet population has reached a record high of 5.52 billion people and uncovers signs that AI may be unseating digital juggernauts as it brings in new forms of engagement. “The phenomenal acceleration of ge… Continue reading Every minute, 4,080 records are compromised in data breaches

Deepfakes question our ability to discern reality

As deepfakes become increasingly sophisticated and accessible, their potential for misuse in areas such as cybercrime, misinformation campaigns, and identity theft continues to grow. In this article, you will find key insights from 2024 reports on deep… Continue reading Deepfakes question our ability to discern reality

When risky cybersecurity behavior becomes a habit among employees

While the majority of employees avoid risky behaviors, a small subset makes them a habit, posing a significant cybersecurity challenge, according to Mimecast. 48% of employees engaged in behaviors that exposed their organizations to cyber risk, with br… Continue reading When risky cybersecurity behavior becomes a habit among employees

Kata Containers: Open-source container runtime, building lightweight VMs

Kata Containers is an open-source project dedicated to creating a secure container runtime that combines the performance and simplicity of containers with the enhanced isolation of lightweight virtual machines. By leveraging hardware virtualization tec… Continue reading Kata Containers: Open-source container runtime, building lightweight VMs

CISOs don’t invest enough in code security

72% of security leaders agree that the age of AI necessitates a complete reset of how organizations approach application security, according to Cycode. This urgency is reinforced by the fact that 93 billion lines of code were generated in the past year… Continue reading CISOs don’t invest enough in code security

The real cost of data breaches for businesses

This article presents key findings from 2024 reports on data breaches. Breaches are taking longer to resolve and are becoming more costly for organizations. With recovery times extending and costs increasing, businesses face growing challenges in manag… Continue reading The real cost of data breaches for businesses