Cybersecurity Snapshot: Cyber Pros Taxed by Overwork, Understaffing and Lack of Support, as Stress Takes a Toll
Life is getting harder for cybersecurity pros, but there are ways to improve working conditions. Check out what a study found. Meanwhile, there’s a new, free attack-emulation tool for OT security teams. Plus, the U.S. government is alerting about exploits to CVE-2022-47966 and CVE-2022-42475. We als...
Tenable Cyber Watch: CISA Urges Cyber Teams to Prep for Quantum Attacks, Ransomware Attacks Surge, and more
This week’s edition of Tenable Cyber Watch unpacks the emerging threat of quantum computers and the recommended steps security teams should take, and addresses the surge in ransomware attacks. Also covered: The White House and other cyber agencies seek public input on how to best secure open source...
Cybersecurity Snapshot: Curb Your Enthusiasm Over ChatGPT-type Tools at Work, Says U.K.’s NCSC
As OpenAI released ChatGPT Enterprise, the U.K.’s cyber agency warned about the risks of workplace use of AI chatbots. Plus, the QakBot botnet got torn down, but the malware threat remains – what CISA suggests you do. Moreover, new quantum-resistant algorithms are due next year. And much more!...
Tenable Cyber Watch: Biden Administration Aims To Limit U.S. Investments in Chinese AI, CISA Issues Cybersecurity Strategic Plan, and more
This week’s edition of Tenable Cyber Watch unpacks the White House’s new executive order seeking to limit U.S. investments in Chinese AI and addresses the cause behind most cloud breaches. Also covered: CISA’s new cybersecurity strategic plan. ...
Cybersecurity Snapshot: CISOs Value Prevention Over Response, While CISA Urges Cyber Teams To Prep for Quantum Attacks
Time to start prepping for the quantum computing threat? CISA thinks so. Plus, why security leaders are prioritizing security prevention tools. Also, find out why ransomware attacks surged in July. Oh, and the White House wants your input on open source security. And much more!...
Tenable Cyber Watch: White House Tackles Cyber Skills Shortage, Cost of Data Breaches Keeps Rising, and more
This week’s edition of Tenable Cyber Watch unpacks the White House’s new initiative to tackle the cyber skills shortage and addresses the surge data breach costs. Also covered: NSA and CISA’s security guidance for 5G network slicing. ...
Cybersecurity Snapshot: CIS Guide Outlines How To Attain an Affordable Cyber Hygiene Foundation
The Center for Internet Security unpacks how to establish foundational cyber hygiene at a reasonable cost. Plus, the Cyber Safety Review Board issues urgent security recommendations on its Lapsus$ report – and announces it’ll next delve into cloud security. Moreover, are humans or AI better at craft...
Tenable Cyber Watch: Hot Takes from Black Hat USA, SANS Releases 2023 Report on Security Awareness, and more
This week’s edition of Tenable Cyber Watch dishes out five hot takes from Black Hat USA and provides guidance on how to better mitigate shadow IT risks. Also covered: How you can boost your security awareness program. ...
Cybersecurity Snapshot: U.S. To Award Millions in AI Cyber Tool Contest, While NIST Revamps Cybersecurity Framework
Got an idea for a new AI-based cybersecurity product? You could win millions in a new contest. Meanwhile, NIST has drafted a major revision to the CSF 2.0 and wants your opinion about it. Also, there’s a new free tool that flags security flaws in public AI models. Plus, most cloud breaches are cause...
Tenable Cyber Watch: SEC Issues New Cyber Disclosure Rules, MITRE’s Most Dangerous Software Weaknesses, and more
This week’s edition of Tenable Cyber Watch unpacks the new cybersecurity disclosures rules from the U.S. Securities and Exchange Commission and looks at MITRE’s list of the most dangerous software weaknesses. Also covered: Cloud adoption by financial institutions continues to increase. What one stud...
Cybersecurity Snapshot: What, Me Worry? Businesses Adopt Generative AI, Security Risks Be Damned
Seduced by generative AI’s potential, organizations plunge ahead overlooking its pitfalls. Plus, check out a common flaw that puts web app data at risk. Also, why many zero day bugs last year were variants of known vulnerabilities. Moreover, find out the current cost of a data breach – ouch! And muc...
Unpacking the Shared Responsibility Model for Cloud Security: How To Avoid Coverage Gaps and Confusion
Confusion over the scope of customer responsibility for cloud security causes control gaps and exposes businesses to risks of attack and non-compliance. Secure configuration of customer-managed resources is the most critical factor for reducing cloud risk. However, it can only be achieved by first u...