Help Net Security
Three steps to secure an organization during mergers and acquisitions
Since 2000, there have been over 790,000 merger and acquisition (M&A) transactions announced globally, consisting of a value over 57 trillion dollars. While these …
As breaches soar, companies must turn to cloud-native security solutions for protection
Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, …
Cybersecurity compliance: Start with proven best practices
As a security professional, you may be tasked with achieving SOC2 compliance for your organization, adopting a NIST framework, or complying with new security laws. These are …
The challenges audit leaders need to look out for this year
Attracting talent with nontraditional skills to audit is the top challenge for audit leaders this year, according to Gartner. A July 2021 survey of 166 audit leaders revealed …
CIOs’ growing responsibilities going beyond IT
A new global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as …
Perimeter intrusion detection systems market to reach $21.3 billion by 2026
The global market for perimeter intrusion detection systems estimated at $11 billion in the year 2020, is projected to reach a revised size of $21.3 billion by 2026, growing …
Jump in attack rates on organizations and individuals
A research from Trend Micro shows how threat actors have increased their attack rate on organizations and individuals, putting digital infrastructure and remote workers at …
The importance of implementing cloud-native security solutions
A Laminar report reveals how companies have increasingly adopted public cloud services, but this overnight change and lack of security controls have led to a jump in data …
Organizations unprepared for a new class of cyber threats: HEAT attacks
Organizations are mostly concerned about ransomware and malware, but despite these growing risks, just 27% have implemented an advanced threat protection on every endpoint …
The impact of ransomware on the cyber insurance market
Recently the threat landscape has been dominated by ransomware, which put the cyber insurance industry under extreme pressure, a Panaseer reserach revealed. 84% of respondents …
Securing DevOps amid digital transformation
There are always new buzzwords/phrases being bandied about. In the late 1990s it was “long tail of the Internet” and “new paradigms”. Then there was this new thing referred to …
The not so scary truth about zero-day exploits
We don’t know what we don’t know; this is the quintessential problem plaguing security teams and the primary reason that zero-day exploits can cause such damage. …
Featured news
Resources
Don't miss
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded
- Rsync vulnerabilities allow remote code execution on servers, patch quickly!
- Contextal Platform: Open-source threat detection and intelligence
- Using cognitive diversity for stronger, smarter cyber defense