CISOs don’t invest enough in code security

72% of security leaders agree that the age of AI necessitates a complete reset of how organizations approach application security, according to Cycode. This urgency is reinforced by the fact that 93 billion lines of code were generated in the past year… Continue reading CISOs don’t invest enough in code security

The real cost of data breaches for businesses

This article presents key findings from 2024 reports on data breaches. Breaches are taking longer to resolve and are becoming more costly for organizations. With recovery times extending and costs increasing, businesses face growing challenges in manag… Continue reading The real cost of data breaches for businesses

Regulations, security, and remote work: Why network outsourcing is booming

A growing number of enterprises in the US are adopting managed network services to support AI and other new technologies across increasingly complex networks, according to ISG. US enterprises lead the way in network outsourcing The 2024 ISG Provider Le… Continue reading Regulations, security, and remote work: Why network outsourcing is booming

The state of cybersecurity and IT talent shortages

This article highlights key findings and trends in the 2024 IT and cybersecurity skills gap, from the shortage of cybersecurity talent to the rising demand for certifications and upskilling programs, offering insights into the current state of skills d… Continue reading The state of cybersecurity and IT talent shortages

Hottest cybersecurity open-source tools of the month: December 2024

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. SafeLine: Open-source web application firewall (WAF) SafeLine is an open-source and self-hosted… Continue reading Hottest cybersecurity open-source tools of the month: December 2024

The sixth sense of cybersecurity: How AI spots threats before they strike

In this Help Net Security interview, Vineet Chaku, President of Reaktr.ai, discusses how AI is transforming cybersecurity, particularly in anomaly detection and threat identification. Chaku talks about the skills cybersecurity professionals need to col… Continue reading The sixth sense of cybersecurity: How AI spots threats before they strike

reconFTW: Open-source reconnaissance automation

reconFTW is an open-source tool that simplifies and automates the reconnaissance process, delivering subdomain enumeration, vulnerability assessment, and gathering intelligence about a target. Using various techniques — such as passive and brute-force … Continue reading reconFTW: Open-source reconnaissance automation

Machine identities are the next big target for attackers

86% of organizations had a security incident related to their cloud native environment within the last year, according to Venafi. As a result, 53% of organizations had to delay an application launch or slow down production time; 45% suffered outages or… Continue reading Machine identities are the next big target for attackers

Cybercriminals tighten their grip on organizations

Cybercriminals are using a variety of new methods to target organizations across industries. In this article, we examine the most pressing trends and findings from the 2024 surveys on the growing threat of cybercrime. Social engineering scams sweep thr… Continue reading Cybercriminals tighten their grip on organizations