![Good](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093031/good-400x200.jpg)
Good cybersecurity comes from focusing on the right things, but what are they?
“There is no wrong way into the security field and it’s never too late to make a career switch that will take you there,” says Mark Orlando, CTO at Raytheon …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
The 5 biggest examples of executive threats and how to prevent them
Many executives focus their security efforts and budgets solely on physical threats, but attacks targeting an executive’s digital presence can be just as dangerous. …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105446/risk-400x200.jpg)
Assessing risk: Measuring the health of your infosec environment
There is an uncomfortable truth that many organizations are not conducting comprehensive assessments of their information security risk; or those that do aren’t getting much …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094406/cloud1-400x200.jpg)
Managing and monitoring privileged access to cloud ecosystems
Cloud data breaches are on the rise, demonstrating time and again the need for a different approach and strategy when it comes to managing and monitoring privileged access to …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103720/tunnel-400x200.jpeg)
How long before quantum computers break encryption?
The verdict is in: quantum computing poses an existential threat to asymmetric cryptography algorithms like RSA and ECC that underpin practically all current Internet …
![ThreatConnect](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093101/threatconnect-400x200.jpg)
ThreatConnect Platform: Security insight for sound decision-making
In this interview, Jason Spies, VP of Engineering & Chief Architect, ThreatConnect, talks about the powerful features of the ThreatConnect Platform. Oftentimes, the …
![cloud computing](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103311/cloud_computing-400x200.jpg)
How to start achieving visibility in the cloud
As a security executive, you have a curious gig. On one hand, you’re responsible for securing your organization across multiple systems, networks, clouds, and geographies. On …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093113/usa-flag-400x200.jpg)
Should the National Security Council restore the cybersecurity coordinator role?
Former national security advisor John Bolton’s elimination of the cybersecurity coordinator role in May 2018 came as a surprise to many in the cybersecurity industry, …
![email danger](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093149/email-danger-400x200.jpg)
How can we thwart email-based social engineering attacks?
More than 99 percent of cyberattacks rely on human interaction to work, Proofpoint recently shared. More often than not, the principal attack method is phishing emails. When …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094026/eye-400x200.jpg)
Tackling biometric breaches, the decentralized dilemma
A recent discovery by vpnMentor revealed a worst case scenario for biometrics: a large cache of biometric data being exposed to the rest of the world. In this case web-based …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093146/robot-400x200.jpg)
Cybersecurity automation? Yes, wherever possible
There was a time when companies were hesitant about their IT and security teams using automation to discharge some of their duties. “I think much of that was due to the …
![audio](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093140/audio2-400x200.jpg)
Could audio warnings augment your ability to fight off cyber attacks?
The security of your environment shouldn’t depend on whether you’re looking in the right place at the right time. While active visual means such as dashboards, emails, …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history