Aggregator
从假新闻刷屏看清“认知安全”:AI时代网络安全的新边疆
CSIRTs Around the World – Azerbaijan
You don’t have to choose between BAS or automated pentesting, you shouldn’t
There’s a debate making the rounds in security circles that sounds reasonable on the surface but falls apart under operational scrutiny: Which is better, breach and attack simulation (BAS) or automated penetration testing (APT)? Security vendors have stoked this debate for obvious reasons, with some even explicitly arguing that automated pentesting should replace BAS entirely. But for practitioners responsible for defending an organization, this framing is the problem. It represents a coverage regression disguised as … More →
The post You don’t have to choose between BAS or automated pentesting, you shouldn’t appeared first on Help Net Security.
Epic Games 裁员逾千人,强调与 AI 无关
Первая «Кремниевая долина» Европы: почему 400 тыс лет назад люди отказались от разнообразия камней ради одного идеального лезвия
Why your phishing simulations aren’t building a security culture
Security culture isn’t built by phishing simulations. In this Help Net Security video, Dan Potter, VP of Cyber Resilience at Immersive, argues that annual training videos and quarterly phishing tests happen in calm, controlled settings that tell us nothing about how people perform when a real incident hits. Real attacks trigger anxiety, cognitive narrowing, and hesitation. People fixate on the loudest problem in the room, lose sight of the bigger picture, and slow down when … More →
The post Why your phishing simulations aren’t building a security culture appeared first on Help Net Security.
CVE-2025-31277
Как заставить нейросеть удалить всё лишнее (и нужное тоже)? Разбираемся в «токсичных потоках»
Your security stack looks fine from the dashboard and that’s the problem
One in five enterprise endpoints is operating outside a protected and enforceable state on any given day, according to device telemetry collected across tens of millions of corporate PCs. That figure, drawn from Absolute Security’s 2026 Resilience Risk Index, has barely moved in a year, even as organizations continue to add security tools and increase spending. The report, which draws on multi-year endpoint telemetry alongside external research, finds that the gap between security deployment and … More →
The post Your security stack looks fine from the dashboard and that’s the problem appeared first on Help Net Security.