Zero trust: Bringing security up to speed for the work-from-anywhere age
The Internet Age has changed so much of how we live and work. We have become accustomed to buying goods online with a few clicks and having them delivered overnight, and out …
Risky business: Steps for building an effective GRC program
Organizations across the board are facing governance, risk, and compliance (GRC)-related challenges. This is due to an over-management of GRC programs and the deployment and …
Cybersecurity is hands-on learning, but everyone must be on the same page
In this interview with Help Net Security, Amanda L. Joyce, Group Leader, Strategic Cybersecurity Analysis & Research, Argonne National Laboratory, offers her unique …
The challenges healthcare CISOs face in an evolving threat landscape
Organizations in the healthcare sector – and especially those engaged in delivering healthcare services – have always been juicy targets for cyber attackers. But …
Can XDR bring the kill chain back to its roots?
When Lockheed Martin engineers first came up with the cyber kill chain concept, the purpose was clear – to mitigate or eliminate a cyberattack. It borrowed from military …
The evolution of identity-first security
Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN …
World Health Organization CISO suggests a holistic approach to cybersecurity
Flavio Aggio, CISO at the World Health Organization, has had a challenging year. Since the onset of the COVID-19 pandemic, the WHO has become a significant target for …
Security matters when the network is the internet
In the past, network security was too often viewed as a separate issue to the design of the network itself, which led to solutions being either poorly thought out or hastily …
Why ransomware is such a threat to critical infrastructure
A recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nation’s critical infrastructure and the ease with which their systems can be …
Demystifying cybersecurity with a more human-centric approach
Every business, whether small or large, needs to address cybersecurity to operate in today’s online world. This has been a stimulus for the cybersecurity industry and explains …
How real-time computing can sound the kill chain alarm
Major attacks and ransomware incidents like SolarWinds, Colonial Pipeline or JBS highlight the critical role cybersecurity plays in protecting infrastructure and the economy. …
RIP guest access, long live shared channels!
While many yearn to return to pre-pandemic days, some aspects of our new normal are welcome. Most notable is the flexibility of hybrid working, with a great majority of …