U.S. election official: ‘Whack-a-mole’ strategies less effective to combat disinfo

A more fragmented information ecosystem is making it more difficult to combat disinformation. 

The post U.S. election official: ‘Whack-a-mole’ strategies less effective to combat disinfo appeared first on CyberScoop.

Continue reading U.S. election official: ‘Whack-a-mole’ strategies less effective to combat disinfo

Modern fraud detection need not rely on PII

Trends in online fraud detection often act as the canary in the coal mine when it comes to understanding and combating the next generation of online scams, fraud and cybersecurity threats. These days, security and fraud experts worry that insufficient … Continue reading Modern fraud detection need not rely on PII

AI’s role in accelerating vulnerability management

With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management specifically, AI is poised to have a profound impact, enhancing two key areas: Pr… Continue reading AI’s role in accelerating vulnerability management

90% of threats are social engineering

In this Help Net Security video, Jakub Kroustek, Malware Research Director at Gen, discusses the Avast Q1 2024 Threat Report. The report highlights significant trends and incidents in cybersecurity. Key findings include: Surge in social engineering att… Continue reading 90% of threats are social engineering

Phones of journalists and activists in Europe targeted with Pegasus

The notorious Israeli spyware was used to target journalists often working in exile from their authoritarian home countries, report finds. 

The post Phones of journalists and activists in Europe targeted with Pegasus appeared first on CyberScoop.

Continue reading Phones of journalists and activists in Europe targeted with Pegasus

The evolution of security metrics for NIST CSF 2.0

CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or single indicators — vulnerabilities detected, percentage of vulnerabilities pat… Continue reading The evolution of security metrics for NIST CSF 2.0

Mattis: Don’t create separate military cyber service

The former defense secretary said U.S. Cyber Command needs emergency authority to be able to operate inside the United States.

The post Mattis: Don’t create separate military cyber service appeared first on CyberScoop.

Continue reading Mattis: Don’t create separate military cyber service

Arizona woman arrested and charged in North Korean IT worker scheme

Christina Chapman facilitated remote work and financial transfers for North Koreans tied to that nation’s weapons development programs, according to the U.S. government.

The post Arizona woman arrested and charged in North Korean IT worker scheme appeared first on CyberScoop.

Continue reading Arizona woman arrested and charged in North Korean IT worker scheme

The critical role of IT staffing in strengthening cybersecurity

Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions. It involves the right staff with the unique expertise necessary to recognize and prevent potential t… Continue reading The critical role of IT staffing in strengthening cybersecurity

Tailoring responsible AI: Defining ethical guidelines for industry-specific use

In this Help Net Security interview, Chris Peake, CISO & SVP at Smartsheet, explains how responsible AI should be defined by each organization to guide their AI development and usage. Peake emphasizes that implementing responsible AI requires bala… Continue reading Tailoring responsible AI: Defining ethical guidelines for industry-specific use