Please turn on your JavaScript for this page to function normally.
CIS Controls v8
3 ways we’ve made the CIS Controls more automation-friendly

Compliance obligations that support data privacy and cyber risk are nearly ubiquitous. Not only that, but they’re expanding. According to Gartner, government regulations …

NetSPI BAS
NetSPI Breach and Attack Simulation (BAS) platform demo

Only 20 percent of common attack behaviors are caught by EDR, SIEM, and MSSP out-of-the-box solutions. Contrary to what many BAS vendors and technology providers claim, 100% …

cyber resilience
How to achieve cyber resilience?

Cyber resilience is a leading strategic priority today, and most enterprises are now pursuing programs to bolster their ability to mitigate attacks. Yet despite the importance …

quantum computing
Quantum computing’s threat to national security

In this Help Net Security video, Denis Mandich, CTO at Qrypt, talks about quantum computing. If we thought AI turned security and privacy on their head, quantum computing will …

cloud
Incorporating cloud security teams into the SOC enhances operational efficiencies

Security leaders are recognizing that cloud and the way cloud security teams work today are becoming increasingly critical to business and IT operations, according to Trend …

identity theft
Examining the long-term effects of data privacy violations

Regulatory bodies are taking potential data privacy violations much more seriously this year after a relatively quiet period that followed the enactment of regulations such as …

lock
Cyber extortion hits all-time high

Cyber extortion attacks have become increasingly prevalent in recent years, posing a significant threat to organizations of all sizes and industries, according to Orange …

identity
Lack of adequate investments hinders identity security efforts

Organizations are still grappling with identity-related incidents, with an alarming 90% reporting one in the last 12 months, a 6% increase from last year, according to The …

week in review
Week in review: 9 free cybersecurity whitepapers, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Cl0p announces rules for extortion negotiation after MOVEit hack The Cl0p …

patch
June 2023 Patch Tuesday forecast: Don’t forget about Apple

UPDATE: June 13, 11:35 AM PT – June 2023 Patch Tuesday was released. The odd month-to-month pattern of CVEs addressed by Microsoft continued with the May Patch Tuesday. …

New infosec products of the week
New infosec products of the week: June 9, 2023

Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Datadog, Enveedo, Lacework, and NinjaOne. Lacework simplifies cloud …

Creating A Small Business Cybersecurity Program
Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition

In this Help Net Security video interview, Alan Watkins, CIS Controls Ambassador, CIS, talks about his new book – Creating a Small Business Cybersecurity Program, Second …

Don't miss

Cybersecurity news