cybersecurity
Lack of key domain security measures leaves organizations at risk
In this Help Net Security video, Ihab Shraim, CTO at CSC, talks about how 75% of the Forbes Global 2000 are exposing themselves to significant enterprise risks as third …
Executives take more cybersecurity risks than office workers
Ivanti worked with cybersecurity experts and surveyed 6,500 executive leaders, cybersecurity professionals, and office workers to understand the perception of today’s …
Will 2023 be another year of chaos and instability?
A defining characteristic of 2022 has been the way that online campaigns driven by real-world events have amassed unexpected energy, fueling hacktivism and inviting in global …
Product showcase: Searchable encryption in Elasticsearch and OpenSearch with IronCore Labs
When it comes to sensitive data, search services are the ultimate treasure trove for hackers. Why slowly sift through information when a search service has indexed it all for …
5 tips for building a culture of cybersecurity accountability
In this Help Net Security video, Corey Nachreiner, CSO at WatchGuard, talks about how effective cybersecurity often boils down to doing the basics: patching, updating, and …
Distractions at work can have serious cybersecurity implications
Distracted employees are twice as likely to do the bare minimum for security at work, according to 1Password. The findings reveal that sustained burnout, now paired with high …
As legislation evolves, businesses need a firm understanding of secure payment options
Despite the constant evolution of the financial landscape, consumers are still prioritizing a seamless and safe payment journey above all else, according to PCI Pal. New …
3 major threat detection methods explained
The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by …
How companies can avoid costly data breaches
IBM found that it takes on average 277 days to discover a security breach and costs businesses an average of $4.35 million per breach. Moreover, the time-to-discovery can …
Nosey Parker: Find sensitive information in textual data and Git history
Praetorian has open-sourced the regular expression-based (RegEx) scanning capabilities of its Nosey Parker secret scanning tool. Scanning filesystem content for secrets …
What CISOs consider when building up security resilience
Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to Cisco. Researchers identified the top …
Analyzing Australia’s cyberthreat landscape, and what it means for the rest of the world
Australia has been the victim of damaging cyberattacks in the latter half of this year, with high-profile incidents impacting businesses across critical sectors such as …
Featured news
Sponsored
Don't miss
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems