cybersecurity
Good security habits: Leveraging the science behind how humans develop habits
In this interview with Help Net Security, George Finney, CSO at Southern Methodist University, explains what good security habits are, how to successfully implement them and …
How to close the cybersecurity workforce gap
(ISC)² released the findings of its 2021 (ISC)² Cybersecurity Workforce Study. The study reveals updated figures for both the Cybersecurity Workforce Estimate and the …
The first step to being cybersmart: Just start somewhere
When it comes to a subject as complex as cybersecurity, it’s easy to become a victim of decision paralysis. When company leaders and IT staff begin looking at their options …
Increased risk tolerances are making digital transformation programs vulnerable
Digital transformation programs could be vulnerable to cyber attacks due to increased risk tolerances and ongoing cybersecurity challenges, according to a global research of …
Why cybersecurity leaders should focus on spending, people and technology (in that order)
The cybersecurity industry is facing greater challenges than ever before. The number of publicly-reported data compromises continues to rise, partially due to the massive …
Network and IoT security in a zero trust security model
You can never be too careful when it comes to network and IoT security. With a rapidly growing number of disparate devices being connected to corporate and industrial …
Despite spending millions on bot mitigation, 64% of organizations lost revenue due to bot attacks
A Kasada survey covers the state of bot mitigation exclusively from the perspective of organizations already using anti-bot solutions. The state of bot mitigation 64% of …
CDR: The secret cybersecurity ingredient used by defense and intelligence agencies
It’s very rare that the defense and intelligence community is vulnerable to file-based attacks. After all, for these organizations security is not a business case, it’s a case …
Many organizations lack basic cyber hygiene despite high confidence in their cyber defenses
SpyCloud released an analysis of IT security leaders’ perceived threat of ransomware attacks and the maturity of their cybersecurity defenses. The report found that while 81% …
What are the post-pandemic security concerns for IT pros?
COVID-19 has had a huge impact on businesses across every industry, and while the urgent need to adapt in early 2020 may have been replaced with greater stability, residual …
Organizations lack basic cybersecurity practices to combat the growing tide of ransomware
Organizations are not equipped to defend against ransomware due to deficiencies in implementing and sustaining basic cybersecurity practices, including managing privileged …
Compliance does not equal security
Buy these widgets. Write these policies. Be compliant. Be secure. While certain industry bodies set specific cybersecurity standards and requirements, following them is not …
Featured news
Resources
Don't miss
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded
- Rsync vulnerabilities allow remote code execution on servers, patch quickly!
- Contextal Platform: Open-source threat detection and intelligence
- Using cognitive diversity for stronger, smarter cyber defense