IT assets
CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0
In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative …
How to withstand the onslaught of cybersecurity threats
“We brought a shovel to fight an avalanche.” That’s the sentiment shared by many business leaders, especially CISOs, CIOs and IT leaders as they face the current cybersecurity …
CISOs confront mounting obstacles in tracking cyber assets
Monitoring assets in ever-changing settings operating in both development and production stages presents challenges. In this Help Net Security video, Daniel Deeney, CEO at …
Best practices for implementing a company-wide risk analysis program
For most organizations today, the threat surface is broad and getting broader. There are the obvious concerns like the user base, remote or BYOD computing, on-premises …
Meet fundamental cybersecurity needs before aiming for more
In this interview for Help Net Security, Mike Lefebvre, Director of Cybersecurity at SEI Sphere, talks about the hierarchy of cybersecurity needs and what should be done to …
Asset risk management: Getting the basics right
In this interview with Help Net Security, Yossi Appleboum, CEO at Sepio, talks about asset risk management challenges for different industries and where it’s heading. …
How a cyber asset management strategy can help enterprises detect threats
Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are …
Is your organization ready for Internet Explorer retirement?
June 15, 2022, is the day that Microsoft will stop supporting most versions of Internet Explorer 11, and organizations should have ensured that they ready for its retirement. …
40% of enterprises don’t include business-critical systems in their cybersecurity monitoring
Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted …
308,000 exposed databases discovered, proper management is key
Group-IB carried out a deep dive into exposed digital assets discovered in 2021. During the research, the attack surface management team analyzed instances hosting …
Siloed technology management increases operational blind spots and cyber risk
Oomnitza revealed a snapshot survey, conducted by Gatepoint Research, which found that siloed technology management is increasing operational blind spots and cyber risk. While …
Do you need cyber asset attack surface management (CAASM)?
In this video for Help Net Security, James Mignacca, CEO at Cavelo, talks about cyber asset attack surface management (CAASM), which Gartner recently identified as an emerging …