Please turn on your JavaScript for this page to function normally.
danger
50% of organizations have indirect relationships with 200+ breached fourth-party vendors

98 percent of organizations have vendor relationships with at least one third-party that has experienced a breach in the last two years, according to SecurityScorecard and The …

patch
The future of vulnerability management and patch compliance

IT departments continue to face immense pressure to get vulnerability and patch management right as threat actors use new and old methods to exploit network endpoints. But are …

analyst
70% of CIOs anticipate their involvement in cybersecurity to increase

77% of CIOs say their role has been elevated due to the state of the economy and they expect this visibility within the organization to continue, according to Foundry. “The …

Trend Micro
Mix of legacy OT and connected technologies creates security gaps

Rising threats to vehicles and industrial operational technology (OT) have led a growing number of enterprises worldwide to invest in advanced technologies and services to …

reload
3 ways to stop cybersecurity concerns from hindering utility infrastructure modernization efforts

Utility infrastructure is in dire need of modernization. In many parts of the world, the infrastructure delivering power and water to consumers is not ready to withstand …

DigiCert Trust Lifecycle Manager
DigiCert releases new unified approach to trust management

New solution brings together full stack of CA-agnostic certificate lifecycle management, PKI services and tightly integrated public trust issuance. We rarely consciously think …

White House
Is President Biden’s National Cybersecurity Strategy a good idea?

In this Help Net Security video, Kurtis Minder, CEO of GroupSense, discusses President Biden’s National Cybersecurity Strategy, designed to take the nation’s …

money
Budget constraints force cybersecurity teams to do more with less

49% of organizations have sufficient budget to fully meet their current cybersecurity needs, and 11% can, at best, protect only their most critical assets, according to a …

money
How organizations can keep themselves secure whilst cutting IT spending

It is the immediate natural reaction of most organizations to cut costs during an economic downturn. But the economy will return and cutting back too far can be damaging in …

Dimitri van Zantvliet
Mounting cybersecurity pressure is creating headaches in railway boardrooms

The expansion of potential cyber threats has increased due to the integration of connected devices, the Internet of Things (IoT), and the convergence of IT and OT in railway …

approved
ICS vulnerabilities: Insights from advisories, how CVEs are reported

SynSaber recently released its second Industrial Control Systems (ICS) Vulnerabilities & CVEs Report. In this Help Net Security video, Ronnie Fabela, CTO at SynSaber, …

insider threat
Insider attacks becoming more frequent, more difficult to detect

Insider threats are a top concern at organizations of all kinds; only 3% of respondents surveyed are not concerned with insider risk, according to Gurucul. With responses from …

Don't miss

Cybersecurity news