Please turn on your JavaScript for this page to function normally.
Sean Doyle
WEF Cybercrime Atlas: Researchers are creating new insights to fight cybercrime

In early 2023, the World Economic Forum (WEF) launched Cybercrime Atlas, with the intent to map the cybercriminal ecosystem by facilitating collaboration between private and …

Strengthening critical infrastructure cybersecurity is a balancing act

In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat …

CISA
Steps CISA should take in 2023

Recently, I was asked to imagine that I had been granted an hour with top officials at the Cybersecurity and Infrastructure Security Agency (CISA) – what advice would I …

Android
Android data sharing remains significant, no opt-out available to users

An in-depth analysis of a range of popular Android mobile phones has revealed significant data collection and sharing, including with third parties, with no opt-out available …

SMS
The dangers of misusing instant messaging and business collaboration tools

71% of office workers globally – including 68% in the US – admitted to sharing sensitive and business-critical company data using instant messaging (IM) and business …

users
Collaboration is the key to a secure world-class sporting event

Securing any world-class event is a massive undertaking that requires teams of security professionals to coordinate with each other and constantly share information. I’ve seen …

icosahedral
5 simple steps to bring cyber threat intelligence sharing to your organization

Cyber threat intelligence (CTI) sharing is a critical tool for security analysts. It takes the learnings from a single organization and shares it across the industry to …

arrows
CISOs: Make 2020 the year you focus on third-party cyber risk

While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this …

shield
Organizations are employing cyber-resilient strategies in new ways

Wipro released its 2019 State of Cybersecurity Report, which highlights the rising importance of cybersecurity defense to global leaders, the emergence of the CISO as a …

IoT
Flaws in the design of IoT devices prevent them from notifying homeowners about problems

Design flaws in smart home Internet of Things (IoT) devices that allow third parties to prevent devices from sharing information have been identified by researchers at North …

laptop
A casual approach to workplace communications presents major security risks

Workers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their …

money
Battling attacks from global criminal networks in the financial sector

Every now and then, banks and financial institutions (and their customers) are targeted by opportunistic hackers, but they are much more worried about those that are smarter, …

Don't miss

Cybersecurity news