Organizations in sectors deemed "essential" or "important" have until October 2024 to comply with the Network and Information Systems Directive 2022 (NIS2).
Read moreNew SSH Vulnerability
November 16 2023This is interesting:
For the first time, researchers have demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to complete...
Read more
Cyber Resilience Requires Maturity, Persistence & Board Engagement
November 16 2023Women in Cyber Security Middle East highlight a requirement for resilience in the face of increased business and cyber challenges.
Read moreQatar & Rwanda Partner to Boost Cybersecurity in Africa
November 16 2023The two countries will work on AI security guardrails, public key infrastructure, smart city cyber, and more.
Read moreAfter the encryption algorithm used by public safety, military, and governments globally was found to allow eavesdropping, standard maintainers are making TETRA open source.
Read moreOil Giant Aramco Drills Down on Saudi ICS Security
November 15 2023Saudi Arabia's national oil and gas company is investing in an operational technology security training academy for organizations across the Kingdom.
Read moreDefending Against Attacks on Vulnerable IoT Devices
November 15 2023Organizations must approach cybersecurity as if they are defending themselves in a cyberwar.
Read moreCombining Agentless and Agent-Based Cloud Security in CNAPPs
November 15 2023Combining both approaches using a cloud-native application protection platform helps organizations make their cybersecurity holistic by tapping into richer automation and prioritization features.
Read moreDanish Energy Attacks Portend Targeting More Critical Infrastructure
November 15 2023Targeted attacks against two dozen related companies is just the latest evidence that hackers want a piece of energy.
Read moreMicrosoft Zero-Days Allow Defender Bypass, Privilege Escalation
November 15 2023Another two bugs in this month's set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet.
Read more
Recent Comments