cyber resilience
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20125121/cyber_resilience-400x200.jpg)
The impossibility of “getting ahead” in cyber defense
As a security professional, it can be tempting to believe that with sufficient resources we can achieve of state of parity, or even relative dominance, over cyber attackers. …
![Michelle Weston](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/07131207/michelle_weston-2-kyndryl-400x200.webp)
Leveraging AI and automation for enhanced security operations
In this Help Net Security interview, Michelle Weston, VP of Security & Resiliency at Kyndryl, discusses the key challenges in security operations and how to address them. …
![STEM](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/14121234/stem-education-400x200.jpg)
No summer break for cybercrime: Why educational institutions need better cyber resilience
The education system isn’t equipped to handle today’s cyberthreats. I’m not just talking about cybersecurity education in schools shaping the technical workforce of the future …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11113856/ai_business-400x200.jpg)
92% of enterprises unprepared for AI security challenges
Most industries continue to run almost two or more months behind in patching software vulnerabilities, endpoints remain vulnerable to threats, and most enterprise PCs must be …
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20125121/cyber_resilience-400x200.jpg)
How exposure management elevates cyber resilience
Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset …
![Eric Demers](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/02132231/eric_demers-2-madaket_health-400x200.webp)
Healthcare’s cyber resilience under siege as attacks multiply
In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare organizations. He highlights challenges in …
![Matt Waxman](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/18131448/matt_waxman-2-veritas-400x200.webp)
Essential elements of a strong data protection strategy
In this Help Net Security interview, Matt Waxman, SVP and GM for data protection at Veritas Technologies, discusses the components of a robust data protection strategy, …
![free cybersecurity guides](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/10120052/free_cybersecurity_guides-1500-400x200.webp)
10 free cybersecurity guides you might have missed
This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11092828/lock-computer-blue-400x200.jpg)
Why cyber maturity assessment should become standard practice
Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help …
![teamwork](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09153009/teamwork-cybersecurity-400x200.jpg)
Collaboration at the core: The interconnectivity of ITOps and security
In this Help Net Security video, Krista Macomber, Research Director at The Futurum Group, discusses how IT and security teams increasingly unite against cyber threats. …
![Mick Baccio](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15142107/mick_baccio-2-splunk-400x200.jpg)
The future of cybersecurity: Anticipating changes with data analytics and automation
In this Help Net Security interview, Mick Baccio, Staff Security Strategist at Splunk SURGe, discusses the future of cybersecurity, emphasizing the importance of data …
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20125121/cyber_resilience-400x200.jpg)
Paying ransoms is becoming a cost of doing business for many
Today’s pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ‘do not pay’ policies, with data recovery deficiencies compounding the …