Please turn on your JavaScript for this page to function normally.
NIST CSF Mapping
The best defense against cyber threats for lean security teams

H0lyGh0st, Magecart, and a slew of state-sponsored hacker groups are diversifying their tactics and shifting their focus to… you. That is, if you’re in charge of cybersecurity …

fist
How cybersecurity decision-makers perceive cyber resilience

In an economic climate putting immense pressure on business leaders to prove ROI and team efficiency – a new report from Immersive Labs looks into the lack of confidence …

money
New York law firm gets fined $200k for failing to protect health data

A New York law firm has agreed to pay $200,000 in penalties to the state because it failed to protect the private and electronic health information of approximately 114,000 …

network
Ignoring network automation is a ticking time bomb for security

IT professionals are frustrated due to the rise in network update velocity and tech stack sprawl, lack of support from leadership, and disagreements and concerns about the …

ChatGPT
Europol details ChatGPT’s potential for criminal abuse

With the increased public interest in ChatGPT, the Europol Innovation Lab took the matter seriously and conducted a series of workshops involving subject matter experts from …

vulnerabilities
What you need before the next vulnerability hits

Cyberattacks tend to come from two angles: criminals take advantage of employees with privileged access or of security weaknesses in your hardware/software infrastructure. …

Code
Running a security program before your first security hire

In this Help Net Security video, Matt Spitz, Head of Engineering at Vanta, talks about pragmatic security and illustrates what a small company with limited resources needs to …

Podcast Adam Boulton
What the food and building industry can teach us about securing embedded systems

As one of the leading experts in product security with over 15 years of experience in security engineering and 120 cybersecurity patents under his belt, Adam Boulton is one of …

shadow IT
Balancing security risks and innovation potential of shadow IT teams

Shadow IT teams, also known as rogue IT teams, have grown in popularity in recent years due to the rise of cloud-based apps and remote work. However, this has led to …

network
Known unknowns: Refining your approach to uncategorized web traffic

Cybersecurity is such a complex field that even the best-trained, best-equipped, and most experienced security managers will sometimes struggle to decide which of several …

data
Prioritizing data security amid workforce disruptions

Businesses have faced massive disruptions in their workforce – many are requesting employees return to the office, and layoffs are rattling several industries. This disruption …

shadow
Understanding adversaries through dark web intelligence

93 percent of CISOs are concerned about dark web threats, and almost 72 percent of CISOs believe that intelligence on cybercriminals is “critical” to defend their organization …

Don't miss

Cybersecurity news