cybersecurity
An offensive mindset is crucial for effective cyber defense
As ransomware attacks continue to increase and cybercriminals are becoming more sophisticated, the federal government has implemented a more proactive approach when it comes …
Threats to hardware security are growing
Hardware attacks are becoming more and more sophisticated. There are several reasons this could be happening: Security increasingly supported in hardware – Mistakes can …
Funding women-led cybersecurity startups: Where are we at?
In 2020, cybersecurity companies raised $8.9 billion globally, and in 2021 the amount jumped (significantly) to over $21 billion. While the data is very exciting and promising …
Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
In this interview for Help Net Security, Dimitri van Zantvliet Rozemeijer, CISO at Nederlandse Spoorwegen (Dutch Railways), talks about railway cybersecurity and the …
NIST updates guidance for cybersecurity supply chain risk management
The National Institute of Standards and Technology (NIST) has updated its guidance document for helping organizations identify, assess and respond to cybersecurity risks …
Nothing personal: Training employees to identify a spear phishing attack
Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide …
Tackling the threats posed by shadow IT
While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust …
A checklist to help healthcare organizations respond to a serious cyberattack
How should organizations in the healthcare sector respond to outage due to a serious cyberattack? The Healthcare and Public Health Sector Coordinating Council’s (HSCC) …
Self-promotion in cybersecurity: Why you should do it, and how
The cybersecurity market is hot! In 2021 Pinpoint Search Group recorded 300 funding rounds invested into cybersecurity vendors that added up to over $20 billion. 158 of those …
The 6 steps to a successful cyber defense
The Ransomware Spotlight Year-End Report from Ivanti, conducted in partnership with Cyber Security Works and Cyware, found that there is now a total of 157 ransomware families …
RSAC Innovation Sandbox Contest finalists announced
RSA Conference announced the 10 finalists for its 17th annual RSAC Innovation Sandbox Contest. The competition calls on the most promising young companies in cybersecurity to …
Password tips to keep your accounts safe
Uswitch.com conducted a consumer survey to find out how the UK chooses their passwords, how safe they are and how often they have been hacked. Writing passwords down on paper …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader