How advances in AI are impacting business cybersecurity

While ChatGPT and Bard have proven to be valuable tools for developers, marketers, and consumers, they also carry the risk of unintentionally exposing sensitive and confidential data. From a security point of view, it always pays to think one step ahea… Continue reading How advances in AI are impacting business cybersecurity

Email security trends in the energy and infrastructure sector

In this Help Net Security video, Mike Britton, CISO at Abnormal Security, discusses how energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. According to Abnormal Security data… Continue reading Email security trends in the energy and infrastructure sector

What is the potential impact of security risks associated specifically with 3D printers or their hosts? [migrated]

Recently a bunch of Anycubic 3D printers have been hacked as reported in an article from bleedingcomputer.com.

According to a wave of online reports from Anycubic customers, someone hacked their 3D printers to warn that the devices are e… Continue reading What is the potential impact of security risks associated specifically with 3D printers or their hosts? [migrated]

Why cyber maturity assessment should become standard practice

Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help determine resilience, where the strengths and weaknesses lie, and what needs to ha… Continue reading Why cyber maturity assessment should become standard practice

Understanding employees’ motivations behind risky actions

More 68% of employees knowingly put their organizations at risk, potentially leading to ransomware or malware infections, data breaches, or financial loss, according to Proofpoint. Perception on security responsibility And while the incidence of succes… Continue reading Understanding employees’ motivations behind risky actions

A step-by-step plan for safe use of GenAI models for software development

If you are a large-scale company, the recent AI boom hasn’t escaped your notice. Today AI is assisting in a large array of development-related and digital-related tasks, from content generation to automation and analysis. The development of AI is rapid… Continue reading A step-by-step plan for safe use of GenAI models for software development

We can’t risk losing staff to alert fatigue

The oft-quoted Chinese military strategist Sun Tzu famously claimed: “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” Exchange “battles” for “cyberattacks”, and the maxim will hold. But too much information … Continue reading We can’t risk losing staff to alert fatigue

Choosing the right partner when outsourcing cybersecurity

In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing cybersecurity services. She compares the cost-effectiveness of outsourcing to maintaini… Continue reading Choosing the right partner when outsourcing cybersecurity

Geopolitical tensions combined with technology will drive new security risks

Misinformation and disinformation are biggest short-term risks, while extreme weather and critical change to Earth systems are greatest long-term concern, according to the Global Risks 2024 Report from the World Economic Forum. Against a backdrop of sy… Continue reading Geopolitical tensions combined with technology will drive new security risks