In a recent development, the National Institute of Standards and Technology (NIST) has chosen HQC as a backup algorithm for post-quantum encryption. This decision comes after NIST previously standardized a set of encryption algorithms to protect data from potential cyberattacks by future quantum computers. The selection of HQC as a backup algorithm aims to provide an additional layer of defense for general encryption tasks, ensuring the security of internet traffic and stored data.
The cybersecurity industry has been shaped by influential books that have stood the test of time. These classic books have played a critical role in shaping professionals’ perspectives on security, risk, and digital threats. Whether you are a Chief Information Security Officer (CISO), a seasoned expert, or a cybersecurity enthusiast, these timeless reads are essential additions to your library.
March 2025 Patch Tuesday forecast indicates a return to normalcy in patch management. The updates and activities from February’s Patch Tuesday marked a significant step towards regular patching procedures, ensuring the security of systems and networks.
Hetty, an open-source HTTP toolkit designed for security research, provides a free alternative to commercial tools like Burp Suite Pro. This tool offers security researchers a comprehensive platform to analyze and enhance the security of web applications.
EDR bypass attacks continue to pose a significant threat to corporate security. In a video by Help Net Security, John Dwyer, Director of Security Research at Binary Defense, discusses the risks associated with over-reliance on Endpoint Detection and Response (EDR) solutions. He highlights the evolving techniques used by attackers and common mistakes made by companies in monitoring EDR telemetry health.
The global transition to remote work has reshaped traditional workplace dynamics and introduced new challenges and opportunities for cybersecurity teams. Embracing a remote workforce can provide strategic advantages to CISOs and security professionals, enhancing team capabilities and driving the modernization of security practices.
Third-party access poses significant risks to organizations’ cybersecurity. In a video by Help Net Security, Fran Rosch, CEO at Imprivata, addresses the challenges in securing third-party access and offers insights on effectively managing these risks.
The Cybersecurity Trinity integrates AI, automation, and active cyber defense (ACD) into a unified strategy to address modern cybersecurity threats comprehensively. This approach provides organizations with a holistic defense mechanism against evolving cyber threats.
NetBird, an open-source network security solution, offers a peer-to-peer private network with centralized access control. This platform enables organizations and individuals to build secure private networks without complex configurations.
Safely disposing of old tech is crucial to prevent security risks related to data on outdated devices. Millions of old devices are discarded annually, making it essential to follow proper disposal procedures to safeguard sensitive information.
CISOs face the challenge of spending wisely on cybersecurity to strengthen organizational security. Common pitfalls in budgeting and prioritizing security initiatives can leave organizations vulnerable to cyber threats. Implementing effective strategies can help CISOs invest in areas that matter the most for enhancing cybersecurity.
The high-pressure nature of cybersecurity operations has led to burnout among CISOs and their teams. The constant battle against threats, compliance requirements, and a shortage of skilled professionals has created a burnout epidemic in the industry. Protecting teams and promoting mental well-being is essential in maintaining a resilient cybersecurity workforce.
As AI technology advances, cybercriminals are leveraging AI-generated scams to deceive individuals and organizations. It is crucial to stay vigilant and learn how to identify and avoid sophisticated AI-generated scams, including deepfake videos and personalized phishing emails.
Enterprises are increasingly adopting passkeys as an alternative to passwords for improved security and user experience. The FIDO Alliance reports that 87% of companies are either implementing or planning to roll out passkeys to enhance security and compliance measures.
The adoption of connected medical devices, known as the Internet of Medical Things (IoMT), has revolutionized patient care but also introduced cybersecurity challenges. Securing medical devices is crucial to safeguard patient safety and protect organizational security from potential cyber threats.
Protecting personal metadata from online trackers is essential for maintaining personal privacy in the digital age. Understanding how metadata is collected and implementing measures to mitigate tracking can help individuals protect their sensitive information online.