Leveraging threat intelligence to tackle supply chain vulnerabilities
In this interview with Help Net Security, Brandon Hoffman, CISO at Intel 471, talks about the growing threat of supply chain attacks, the most common supply chain …
To avoid cyberattacks, companies need to think like hackers
Companies are spending more than ever on cybersecurity but, despite a plethora of new security systems, they continue to be vulnerable to attacks, which are not only becoming …
The biggest problem with ransomware is not encryption, but credentials
With each passing day, the threat of ransomware increases in frequency, sophistication, and effectiveness. What started as a simple annoyance scheme to collect a ransom has …
3 ways any company can guard against insider threats this October
October is Cybersecurity Awareness Month, but most business leaders and consumers don’t need a special event to remember cybersecurity’s preeminence in today’s turbulent …
Implementing risk quantification into an existing GRC program
With a myriad of risks and limited security budgets, how do organizations decide which projects to prioritize? Many governance, risk management and compliance (GRC) …
The evolution of DRaaS
The shift of daily production workloads from on-premises to cloud has also impacted approaches to protection of business assets and operations. When it comes to protecting …
Policy and patience key in Biden’s cybersecurity battle
Last month, President Biden hosted a group of technology and insurance executives to build support for a “whole-of-nation effort” to improve cybersecurity. The executive …
Automation is not here to close the cybersecurity skills shortage gap, but it can help
In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the …
Protecting IoT devices requires a DNS-based solution
IoT devices are fast becoming an everyday part of our lives. Whether it be in the role they play in manufacturing and industry or powering the appliances in our own homes, …
How to protect the corporate network from spyware
It used to be easy for network administrators to identify where corporate boundaries are; they were usually where the external and internal networks meet. That made it easy …
Leveraging AI and automation to identify sensitive data at scale
In this interview with Help Net Security, Apoorv Agarwal, CEO at Text IQ, talks about the risk of unstructured data for organizations and the opportunity to leverage AI and …
We cannot afford for healthcare security to be the “lowest-hanging fruit”
Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other …