Three Quarters of Dependency Vulnerability Patches Lead to Breakages, Report Finds

Three Quarters of Dependency Vulnerability Patches Lead to Breakages, Report Finds

Patches deployed for dependency vulnerabilities cause breakages 75% of the time, a new report has revealed. Minor updates were found to break clients 94% of the time, and for version upgrades this was 95%. Software dependencies — the external code or libraries that a project requires to function properly — are notoriously difficult to manage during application development. Remediating vulnerabilities in dependencies requires a major version update 24% of the time. “Seemingly the most straight-forward…

Read More

Cybersecurity Hiring: How to Overcome Talent Shortages and Skills Gaps

Cybersecurity Hiring: How to Overcome Talent Shortages and Skills Gaps

A recent report and panel discussion by the International Information System Security Certification Consortium concluded that the technology industry urgently needs more cybersecurity professionals — but significant barriers persist. The 2024 ISC2 Cybersecurity Workforce Study, which includes responses from 15,852 cybersecurity practitioners and decision-makers globally, found that 90% of respondents face skills shortages within their organizations — particularly in areas such as AI, cloud computing, security, and zero trust implementation. Some of these shortages can…

Read More

Cisco and BT Partner to Upskill Ukrainian Refugees in Ireland

Cisco and BT Partner to Upskill Ukrainian Refugees in Ireland

BT and Cisco have been in a strategic partnership since 1990, focusing on delivering a wide range of network, communications, and IT solutions to businesses both nationally and globally. Both companies are also passionate advocates for STEM promotion, with Cisco previously supporting the BT Young Scientist & Technology Exhibition (BTYSTE), one of the leading school STEM exhibitions in Europe which BT has organised and grown since 2001. In January 2023, Cisco leadership attended the BT…

Read More

Cisco University: Elevate Your Cybersecurity, Network Security, Forensics, and Incident Response Skills

Cisco University: Elevate Your Cybersecurity, Network Security, Forensics, and Incident Response Skills

In my three-decade-long career, I have had the privilege of undergoing extensive training in various aspects of cybersecurity, network security, and computer forensics. With numerous certifications and over 900 hours of specialized training from the NSA and the National Cryptographic School (NCS), and more than 600 hours from the FBI and the FBI Academy in Computer Forensics, I have always been committed to staying at the forefront of this ever-evolving field. As a result, I’ve…

Read More

IBM on Future Cybersecurity: Passkeys, Deepfakes, Quantum Computing

IBM on Future Cybersecurity: Passkeys, Deepfakes, Quantum Computing

“The internet will be a lot safer in five years than it is today, thanks to technological advances that address common problems at scale.” This prediction by Chris Hockings, CTO of IBM Asia Pacific, might seem a bit ambitious given that AI-powered cybercrime is growing at an exponential rate, deepfake technology is enhancing social engineering attacks, and the power of quantum computing is on the horizon. But Hockings spoke with TechRepublic about how he believes…

Read More

RATs in the tunnel: Uncovering the cyber underworld.

RATs in the tunnel: Uncovering the cyber underworld.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More

How to Spot Phishing Lures | McAfee Blog

How to Spot Phishing Lures | McAfee Blog

Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More specifically, your personal info and your money. Whether a scammer reaches out by email, with a text, or through a direct message, that’s what they’re after. And with a link, they whisk you off to a sketchy site designed to take them from you. Just…

Read More

Low Media Literacy: A Risk to Australia's Cybersecurity Landscape

Low Media Literacy: A Risk to Australia's Cybersecurity Landscape

A recent study by Western Sydney University, Adult Media Literacy in 2024, revealed worryingly low levels of media literacy among Australians, particularly given the deepfake capabilities posted by newer AI technologies. This deficiency poses an IT security risk, given that human error remains the leading cause of security breaches. As disinformation and deepfakes become increasingly sophisticated, the need for a cohesive national response is more urgent than ever, the report noted. Because AI can produce…

Read More

Why the UN Convention Against Cybercrime Requires a Second Look

Why the UN Convention Against Cybercrime Requires a Second Look

Cybercrime is escalating globally. Criminal groups are leveraging advanced technology to operate across borders, necessitating that law enforcement agencies have the capabilities to prevent, investigate, and prosecute these crimes while also protecting human rights. Effective international cooperation is essential to combat these threats and uphold shared values. However, the recently adopted UN Convention against Cybercrime falls short and requires more attention before ratification by member states. Concerns for human rights and liberal democracies values in…

Read More

The AI Revolution: Transforming Technology and Reshaping Cybersecurity

The AI Revolution: Transforming Technology and Reshaping Cybersecurity

Artificial Intelligence (AI) is revolutionizing government and technology, driving an urgent need for innovation across all operations. Although historically, local and state government systems have seen only incremental changes with limited AI adoption, today, a significant shift is occurring as AI is integrated across all government sectors. Benefits of AI Integration The benefits of these changes are evident. AI-powered systems analyze vast amounts of data, offering insights for better decision-making. Public services become more personalized…

Read More
1 6 7 8 9 10 27