Even the US president wants zero trust: Here’s how to make it a reality
President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively …
Stop the breaches! Four steps to minimize security risks
Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. …
How to prepare for Apple’s Mail Privacy Protection
Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half …
Ransomware and cyber insurance: What are the risks?
High-profile ransomware events, such as the Colonial Pipeline and Kaseya attacks, continue to create eye-popping headlines about how easily a cybercriminal group can cripple …
A remedial approach to destructive IoT hacks
As of this year, there are more than 10 billion active IoT devices all over the world, many of which are deployed in enterprises. Keeping those devices secure is of the utmost …
Elevating cyber resilience and tackling government information security challenges
Esti Peshin is VP, General Manager, Cyber Division, Israel Aerospace Industries (IAI). Previously, she served 11 years in the Israeli Defense Forces, in an elite technology …
Zero trust: Bringing security up to speed for the work-from-anywhere age
The Internet Age has changed so much of how we live and work. We have become accustomed to buying goods online with a few clicks and having them delivered overnight, and out …
Risky business: Steps for building an effective GRC program
Organizations across the board are facing governance, risk, and compliance (GRC)-related challenges. This is due to an over-management of GRC programs and the deployment and …
Cybersecurity is hands-on learning, but everyone must be on the same page
In this interview with Help Net Security, Amanda L. Joyce, Group Leader, Strategic Cybersecurity Analysis & Research, Argonne National Laboratory, offers her unique …
Can XDR bring the kill chain back to its roots?
When Lockheed Martin engineers first came up with the cyber kill chain concept, the purpose was clear – to mitigate or eliminate a cyberattack. It borrowed from military …
The evolution of identity-first security
Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN …
World Health Organization CISO suggests a holistic approach to cybersecurity
Flavio Aggio, CISO at the World Health Organization, has had a challenging year. Since the onset of the COVID-19 pandemic, the WHO has become a significant target for …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics