Day: November 15, 2023
-
Veterans play a crucial role in filling the cybersecurity skills gap
While the veteran unemployment rate may be at a historic low, the transition from the military to civilian life isn’t without its challenges. For starters, ex-military members often need help translating their skills gained in the armed forces to non-military roles, and many need to become more familiar with the wide variety of civilian career path…
-
Intel patches high-severity CPU privilege escalation flaw
Intel has released microcode updates for several generations of mobile, desktop, and server CPUs to fix a vulnerability that can be exploited to trigger at the very least a denial-of-service condition, but potentially privilege escalation and information disclosure. The flaw can be exploited if an attacker has local code execution on the operating system, including…
-
Microsoft unveils expansion of AI for security and security for AI at Microsoft Ignite
The future of security with AI The increasing speed, scale, and sophistication of recent cyberattacks demand a new approach to security. Traditional tools are no longer enough to keep pace with the threats posed by cybercriminals. In just two years, the number of password attacks detected by Microsoft has risen from 579 per second to…
-
For top cybersecurity talent, companies pay over $500,000: Report
CISOs have a huge amount to consider when trying to align their plans with those of the broader organization, if they hope to hang on to their top talent. To keep pace, according to a survey released today by security analysis firm IANS and headhunting firm Artico, recommend keeping compensation at the high end of…
-
Introducing hostname and ASN lists to simplify WAF rules creation
If you’re responsible for creating a Web Application Firewall (WAF) rule, you’ll almost certainly need to reference a large list of potential values that each field can have. And having to manually manage and enter all those fields, for numerous WAF rules, would be a guaranteed headache. That’s why we introduced IP lists. Having a…
-
Understanding OWASP’s Bill of Material Maturity Model: Not all SBOMs are created equal
The exponential growth of software supply chain attacks has triggered an industrywide push for increased transparency around the provenance and content of the programs and code that are brought into today’s systems. One artifact playing a critical role in that increased transparency is the software bill of materials (SBOM) or, more broadly, bills of material…