Please turn on your JavaScript for this page to function normally.
computer
OT cyber attacks proliferating despite growing cybersecurity spend

The sharp increase in attacks on operational technology (OT) systems can be primarily attributed to two key factors: the escalating global threats posed by nation-state actors …

ransomware
Ransomware groups continue to increase their operational tempo

Q3 of 2023 continued an ongoing surge in ransomware activity, according to GuidePoint Security. GuidePoint Research and Intelligence Team (GRIT) observed a nearly 15% increase …

data analytics
CISOs struggling to understand value of security controls data

Many CISOs are grappling with the conundrum of the purpose and value of security controls data in supporting critical business decisions, according to Panaseer. The biggest …

approved
What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT

The newly released Security and Exchange Commission (SEC) cyber incident disclosure rules have been met with mixed reviews. Of particular concern is whether public companies …

lock
Strategies to overcome cybersecurity misconceptions

Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net …

email
Security leaders have good reasons to fear AI-generated attacks

Generative AI is likely behind the increases in both the volume and sophistication of email attacks that organizations have experienced in the past few months, and it’s …

privacy
Consumers are taking action to protect their privacy

Younger consumers are taking deliberate action to protect their privacy, as 42% of consumers aged 18-24 exercise their Data Subject Access Rights, compared with just 6% for …

fighting ransomware
Bracing for AI-enabled ransomware and cyber extortion attacks

AI has been the shiniest thing in tech since at least November 2022, when ChatGPT was made available to the masses and unveiled the transformative potential of large language …

Wazuh
Wazuh: Free and open-source XDR and SIEM

Wazuh is an open-source platform designed for threat detection, prevention, and response. It can safeguard workloads in on-premises, virtual, container, and cloud settings. …

data analytics
The primary pain points for SOC teams

Security professionals want to pursue high-impact work, but they’re being held back by growing workloads, shrinking budgets, and a worsening skills shortage, according to …

CISO
Today’s CIO has ambitions well beyond IT delivery

45% of CIOs are beginning to work with their CxO peers to bring IT and business area staff together to co-lead digital delivery on an enterprise-wide scale, according to …

keys
How passkeys are changing the face of authentication

As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is a passkey and why do we need them? A …

Don't miss

Cybersecurity news