Tag: infosec
-
Huntress’s ‘hilarious’ attacker surveillance splits infosec community
Tags: infosecEthical concerns raised after crook offered themselves up on silver platter First seen on theregister.com Jump to article: www.theregister.com/2025/09/12/huntress_attacker_surveillance/
-
Huntress’s ‘hilarious’ attacker surveillance splits infosec community
Tags: infosecEthical concerns raised after crook offered themselves up on silver platter First seen on theregister.com Jump to article: www.theregister.com/2025/09/12/huntress_attacker_surveillance/
-
New infosec products of the week: September 12, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Cynomi, DataLocker, Gigamon, Lookout, and Relyance AI. Cynomi simplifies vendor risk … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/12/new-infosec-products-of-the-week-september-12-2025/
-
WhatsApp’s former security boss claims reporting infosec failings led to ousting
Meta shrugs off allegations of improper dismissal, ignoring privacy and security First seen on theregister.com Jump to article: www.theregister.com/2025/09/08/whatsapp_exsecurity_head_sues_company/
-
How Trust Centers and AI are replacing security questionnaires and accelerating B2B sales
Something strange happens in the final weeks of a sales quarter. No matter how aligned the stakeholders are, it often takes just one email to derail a deal: “Hey, before we proceed, our InfoSec team needs you to fill out this security questionnaire.” As Anna say in the podcast, “Security reviews show up just when…The…
-
CISSP certification: Requirements, training, exam, and cost
Tags: access, business, china, ciso, cloud, computer, credentials, cybersecurity, government, guide, infosec, jobs, linkedin, network, risk, risk-management, skills, trainingWho should get a CISSP?: CISSP has been called the “gold standard” of security certifications. “From the hiring side, the CISSP remains one of the most valued certifications I look for,” says Ankit Gupta, Senior Security Engineer at Exeter Finance. “It shows a candidate has a firm grasp of security principles across multiple domains, and…
-
Infosec products of the month: August 2025
Tags: infosecHere’s a look at the most interesting products from the past month, featuring releases from: Black Kite, Brivo, Cloudflare, Descope, Doppel, Druva, Elastic, ExtraHop, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/29/infosec-products-of-the-month-august-2025/
-
CCSP certification: Exam, cost, requirements, training, salary
Tags: access, application-security, best-practice, china, cloud, compliance, computer, credentials, cybersecurity, data, governance, infosec, infrastructure, jobs, risk, skills, training, usaCCSP vs. CISSP: ISC2 also offers the Certified Information Systems Security Professional (CISSP) certification aimed at upper-level security pros with industry experience. The biggest difference between these two certifications is that the CISSP exam draws from a much broader and more general pool of security knowledge, as it is meant to show that you can design,…
-
TDL001 – Cybersecurity Explained: Privacy, Threats, and the Future – Chester Wisniewski
Tags: access, ai, attack, backdoor, breach, business, ciso, computer, country, crime, crimes, cyber, cybercrime, cybersecurity, data-breach, defense, detection, edr, email, finance, firewall, gartner, government, guide, hacker, hacking, Hardware, infosec, Internet, jobs, linkedin, mail, malicious, microsoft, military, monitoring, network, password, phishing, phone, privacy, programming, ransomware, risk, russia, scam, skills, software, sophos, spam, sql, strategy, switch, technology, threat, update, virus, vulnerability, wifi, windowsSummary “The Defenders Log” Episode 1 features host David Redekop and guest Chet Wisniewski discussing the dynamic world of cybersecurity. Wisniewski, with decades of experience, traces his journey from early BBS and phone network exploration to becoming a cybersecurity expert. They delve into the evolution of hacking, the emergence of profitable cybercrime like email spam,…
-
Who are you again? Infosec experiencing ‘Identity crisis’ amid rising login attacks
Vendor insists passkeys are the future, but getting workers on board is proving difficult First seen on theregister.com Jump to article: www.theregister.com/2025/08/27/ciscos_duo_identity_crisis/
-
2025 CSO Hall of Fame: Meg Anderson on AI, strategic security investments, and life after InfoSec
Tags: ai, automation, business, ciso, conference, cyber, cybersecurity, finance, infosec, jobs, metric, phishing, programming, risk, risk-management, software, strategy, technology, threat, toolWhich technologies are you most cautious about from a CISO’s point of view, and why?: Meg Anderson: I’m cautious of “solutions” that don’t solve a strategic problem. CISOs only have so much budget and mindshare. You need to understand where a tool fits in your investment and strategic roadmap. There were times when my team…
-
New infosec products of the week: August 22, 2025
Tags: infosecHere’s a look at the most interesting products from the past week, featuring releases from Doppel, Druva, LastPass, and StackHawk. StackHawk empowers security teams to expand … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/22/new-infosec-products-of-the-week-august-22-2025/
-
Browser wars are back, predicts Palo Alto, thanks to AI
CEO says if you buy all your infosec stuff from him, life under assault from bots will be less painful First seen on theregister.com Jump to article: www.theregister.com/2025/08/19/palo_alto_networks_q4_fy25/
-
How Brandolini’s law informs our everyday infosec reality
Brandolini’s law, also known as the “bullshit asymmetry principle”, is simple but devastating: >>The amount of energy needed to refute bullshit is an order of magnitude … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/11/brandolinis-law-cybersecurity-reality/
-
What is a CISO? The top IT security leader role explained
Tags: access, authentication, breach, business, ceo, cio, cisa, ciso, compliance, computer, container, control, corporate, credentials, cyber, cybersecurity, data, ddos, defense, dns, encryption, exploit, finance, firewall, framework, fraud, guide, Hardware, healthcare, infosec, infrastructure, intelligence, international, jobs, kubernetes, mitigation, msp, mssp, network, nist, programming, RedTeam, regulation, risk, risk-management, security-incident, service, skills, software, strategy, technology, threat, training, vpn, zero-day, zero-trust. You’ll often hear people say the difference between the two is that CISOs focus entirely on information security issues, while a CSOs remit is wider, also taking in physical security as well as risk management.But reality is messier. Many companies, especially smaller ones, have only one C-level security officer, called a CSO, with IT…
-
New infosec products of the week: August 8, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Black Kite, Descope, Elastic, ExtraHop, LastPass, and Riverbed. Elastic AI SOC … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/08/new-infosec-products-of-the-week-august-8-2025/
-
Infosec products of the month: July 2025
Here’s a look at the most interesting products from the past month, featuring releases from: Akeyless, At-Bay, Barracuda Networks, Bitdefender, Cynomi, Darwinium, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/01/infosec-products-of-the-month-july-2025/
-
Industry experts warn crypto infrastructure is ‘creaking’
A new report from experts at HSBC, Thales and InfoSec Global claims decades-old cryptographic systems are failing, putting businesses at risk from current vulnerabilities and the threat from quantum computing First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628242/Industry-experts-warn-crypto-infrastructure-is-creaking
-
New infosec products of the week: July 25, 2025
Tags: infosecHere’s a look at the most interesting products from the past week, featuring releases from Akeyless, Bitdefender, Malwarebytes, ManageEngine, PlexTrac, and Seemplicity. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/25/new-infosec-products-of-the-week-july-25-2025/
-
China warns citizens to beware backdoored devices, on land and under the sea
Suggests buying local tech to avoid infosec worries First seen on theregister.com Jump to article: www.theregister.com/2025/07/23/china_backdoor_alerts/
-
New infosec products of the week: July 18, 2025
Here’s a look at the most interesting products from the past week, featuring releases from At-Bay, Immersive, NETSCOUT, Socure, and Stellar Cyber. Stellar Cyber 6.0.0 enhances … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/18/new-infosec-products-of-the-week-july-18-2025/
-
AI poisoning and the CISO’s crisis of trust
Tags: access, ai, breach, ceo, ciso, compliance, control, cybersecurity, data, defense, detection, disinformation, exploit, framework, healthcare, identity, infosec, injection, LLM, monitoring, network, privacy, RedTeam, resilience, risk, russia, saas, threat, tool, trainingFoundation models began parroting Kremlin-aligned propaganda after ingesting material seeded by a large-scale Russian network known as the “Pravda Network.”A high-profile AI-generated reading list published by two American news outlets included 10 hallucinated book titles mistakenly attributed to real authors.Researchers showed that imperceptible perturbations in training images could trigger misclassification. Researchers in the healthcare domain demonstrated…
-
Chinese censorship-busters claim Tencent is trying to kill its WeChat archive
Alleges Singaporean infosec outfit sent feeble legal demands to hosting company, which caved First seen on theregister.com Jump to article: www.theregister.com/2025/07/11/greatfire_alleges_tencent_legal_attack/
-
New infosec products of the week: July 11, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Barracuda Networks, Cynomi, Lepide, Tosibox, and Zenni Optical. Cynomi’s platform … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/11/new-infosec-products-of-the-week-july-11-2025/
-
AMD warns of new Meltdown, Spectre-like bugs affecting CPUs
Low-severity bugs but infosec pros claim they are a ‘critical’ overall threat patch accordingly First seen on theregister.com Jump to article: www.theregister.com/2025/07/09/amd_tsa_side_channel/
-
New infosec products of the week: July 4, 2025
Tags: infosecHere’s a look at the most interesting products from the past week, featuring releases from DigitalOcean, Scamnetic, StealthCores, and Tracer AI. Scamnetic KnowScam 2.0 helps … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/04/new-infosec-products-of-the-week-july-4-2025/
-
Infosec products of the month: June 2025
Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, AttackIQ, Barracuda Networks, BigID, Bitdefender, Contrast Security, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/27/infosec-products-of-the-month-june-2025/
-
That WhatsApp from an Israeli infosec expert could be a Iranian phish
Charming Kitten unsheathes its claws and tries to catch credentials First seen on theregister.com Jump to article: www.theregister.com/2025/06/26/that_whatsapp_from_an_israeli/
-
Qilin ransomware top dogs treat their minions to on-call lawyers for fierier negotiations
It’s a marketing move to lure more affiliates, says infosec veteran First seen on theregister.com Jump to article: www.theregister.com/2025/06/20/qilin_ransomware_top_dogs_treat/

