Security

Scammers, posing as bioscience and health companies, are enticing students to attend a video call about a job with the intention of getting them to pay bogus fees as a condition of employment

There is a notable increase in tension between application security workers and application developers over consensus on cloud-native needs, in addition to a growing concern about retaining developer talent in this context

Venn Software introduces a patented secure enclave technology, transforming the control over PCs in remote work settings. This innovation promises to bring the ease of mobile device management to the personal computer domain

Let's talk about security this week in the context of HP's Quarterly Security Report, and what HP is doing to step up to the problem. Then we'll close with what may be my new favorite phone: the Motorola 2023 Razr foldable phone

A survey of 8,000 people in the U.S., U.K., France, and Germany, found that 75% of the respondents do not adhere to password best practices, while nearly two-thirds acknowledged they’re using weak passwords or repeat variations of passwords to protect their online accounts

Workers are leveraging AI tools to enhance individual productivity while keeping their usage under wraps. However, this covert approach may hinder overall organizational performance, warns a Wharton professor. Encouraging transparency and implementing AI-friendly policies can help organizations harn...

The findings of a new report highlight the growing urgency for cybersecurity measures in response to the increasing threat of email attacks crafted with generative AI

Researchers reveal a novel security risk as hackers exploit generative AI's 'hallucinations' to deliver malicious code into a company's development environment, posing a growing threat to enterprise security

As supply chain attacks continue to pose significant risks, SBOMs have become a vital tool for secure DevOps and enhanced threat intelligence. Let's explore the six main types of SBOMs, their use cases, and how to select the most suitable one for your organization's needs

The U.S. Department of Justice has another feather in its cyberwarfare cap after taking down the cybercrime network of Turla, a criminal gang linked to Russia called one of the world's most sophisticated cyber-espionage groups

CISOs' concerns grow as 68% anticipate a material cyberattack within a year, showing a shift in attitude toward future threats. Increased attack vectors and a wider attack surface contribute to this sentiment, while employee turnover raises data security risks

CONFERENCE REPORT

RSA Conference Rebounds as Business Risks Soar

Like a persistent piece of malware that your antivirus product just can't seem to eradicate, the annual RSA cybersecurity conference was back with a vengeance this year. But while the malware example is inherently malicious, the industry event seemed to be bustling with goodwill and a positive messa...

Some industry researchers suggest that hiring cybersecurity talent from non-traditional backgrounds, like bartenders or schoolteachers, is an ideal outside-the-box solution

After feeding more than 15.6 million passwords into an AI-powered password cracker, researchers concluded that it is possible to crack 51% of common passwords within a minute

Technewsworld Channels