Please turn on your JavaScript for this page to function normally.
risk
Getting ahead of a major blind spot for CISOs: Third-party risk

For many CISOs and security leaders, it was not long ago that their remit focused on the networks and digital ecosystems for their organization alone. In today’s digital …

industry
New standard enhances the cybersecurity of pipeline control systems

The American Petroleum Institute (API) published its 3rd Edition of Standard (Std) 1164, Pipeline Control Systems Cybersecurity, underscoring the natural gas and oil …

video call
Hybrid work is here to stay, but security concerns are high

As a rise in variants spurs new uncertainties around the COVID-19 pandemic, businesses around the globe are tasked with developing a long-term plan and work model, whether …

Hands
Why companies should never hack back

After major cyberattacks on the Colonial Pipeline and on meat supplier JBS, the idea of allowing companies to launch cyberattacks back at cyber criminals was proposed. This …

template
Online tests could help organizations plug the skills gap

IT certifiers need to scale up their programs to combat a global skills shortage. Continuing to use online tests after the pandemic will help organizations deliver …

Kubernetes
Building for transactional workloads is the primary concern around deploying Kubernetes

Research conducted by Cockroach Labs and Red Hat shows 94% of organizations surveyed deploy services and applications on Kubernetes — but how they deploy varies widely. The …

security awareness
Cybersecurity awareness is one of the skills needed for a post-pandemic economy

“Digital collaboration” and “critical thinking” are among the modern skills workers need for the post-pandemic economy, according to a new report. Questionmark is calling on …

Peter Broadhurst
Cyber threats, passenger vessels and superyachts: The current state of play

In this interview with Help Net Security, Peter Broadhurst, Maritime Senior VP Safety, Security, Yachting and Passenger, Inmarsat, talks about the impact of cyber threats on …

Doug Yeum
Operationalize AWS security responsibilities in the cloud

In a sea of available MSSPs, organizations can find it hard to choose the one that can offer the right cloud security expertise. To make this decision easier, AWS has …

upload
File upload security best practices rarely implemented to protect web applications

Despite a marked increase in concerns around malware attacks and third-party risk, only 8% of organizations with web applications for file uploads have fully implemented the …

lock
How enterprises use security operations to modernize their business

CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and …

privacy
Consumers value privacy more than potential savings when purchasing insurance

A recent survey by Policygenius explored consumer sentiment toward new tech being deployed by home and auto insurance companies. The survey found that most consumers prefer …

Don't miss

Cybersecurity news