Please turn on your JavaScript for this page to function normally.
shadow
Will vacancies create security voids?

Automation may be shortening the Mean Time to Response (MTTR) when it comes to detecting and responding to attacks, but there is still no substitute for the human in the kill …

ENISA
ENISA and CERT-EU publish set of cybersecurity best practices for public and private organizations

The European Union Agency for Cybersecurity (ENISA) and CERT-EU published a joint set of cybersecurity best practices for public and private organizations in the EU. ENISA …

lock
Even when warned, businesses ignore critical vulnerabilities and hope for the best

A Bulletproof research found the extent to which businesses are leaving themselves open to cyber attack. When tested, 28% of businesses had critical vulnerabilities – …

Aaron Rinehart
Building confidence in your system’s security with chaos engineering

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient …

fist
What makes achieving cyber resilience difficult?

Anomali published a report which provides visibility into the current threat landscape, reveals the top challenges to establishing a resilient cybersecurity posture, and …

brain
How to achieve greater cyber resiliency

Spurred on by economic shutdowns, cyber criminals have become more cunning and brazen than ever before, executing ransomware attacks against organizations of all sizes across …

lock
Exploring the current state of cybersecurity resilience

Cyberattacks surged over fivefold during the height of the pandemic, with large U.K. organisations each facing an average of 885 attempted cyberattacks in 2020 – up from 156 …

ransomware
Businesses need to stop thinking that ransomware is different from other attacks

Organizations are in danger of allowing the spectre of ransomware attacks to distract them from keeping up with general security measures, according to SE Labs. The company …

businessman
Organizations seldom prioritize cybersecurity over business outcomes

55% of large companies are not effectively stopping cyberattacks, finding and fixing breaches quickly, or reducing the impact of breaches, according to a research study from …

road sign
Compliance does not equal security

Buy these widgets. Write these policies. Be compliant. Be secure. While certain industry bodies set specific cybersecurity standards and requirements, following them is not …

ransomware
Ransomware attacks on the rise – How to counter them?

In June 2012, Deloitte conducted an online survey of 50 C-suite and other executives about cyber threat detection and response and found that almost 87% of the pollees …

insider threat
3 ways any company can guard against insider threats this October

October is Cybersecurity Awareness Month, but most business leaders and consumers don’t need a special event to remember cybersecurity’s preeminence in today’s turbulent …

Don't miss

Cybersecurity news