Please turn on your JavaScript for this page to function normally.
Google Chrome security
Google adds new risk assessment tool for Chrome extensions

Google has made available a new tool for Google Workspace admins and security teams to make an assessment of the risk different Chrome extensions may present to their users: …

arrows
A third-party’s perspective on third-party InfoSec risk management

More than ever, organizations are relying on third parties to streamline operations, scale their business, expand and leverage expertise, and reduce costs. In the complex and …

Luigi Lenguito
Can we predict cyber attacks? Bfore.AI says they can

Recently, at Cybertech Tel Aviv 2023, I met with Luigi Lenguito, CEO at Bfore.AI, who introduced me to their technology. In this Help Net Security interview, Lenguito talks …

Dritan Saliovski
How to tackle the cybersecurity skills shortage in the EU

The cybersecurity skills shortage is a global problem, but each region – including Europe or, more specifically, the EU – has distinct problems it has to tackle to …

risk assessment
Why chasing risk assessments will have you chasing your tail

Third-party risk assessments are often described as time-consuming, repetitive, overwhelming, and outdated. Think about it: organizations, on average, have over 5,000 third …

insider threat
How to set up a powerful insider threat program

Security spend continues to focus on external threats despite threats often coming from within the organization. A recent Imperva report (by Forrester Research) found only 18 …

Simon Winchester
The changing role of the CCO: Champion of innovation and business continuity

In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of the chief compliance officer (CCO) …

risk
The benefits of cyber risk quantification in the modern cybersecurity landscape

Kovrr and SANS Institute released their joint survey that reveals enterprise motivation and impact of cyber risk quantification (CRQ) in the modern cybersecurity landscape. …

college
Navigating data privacy in the higher education ecosystem

The need for academic institutions to become data privacy advocates is paramount. Over the past 24 months, higher education institutions have accelerated digital …

Log4j
Log4j exploitation risk is not as high as first thought, cyber MGA says

When the Log4Shell vulnerability (CVE-2021-44228) was publicly revealed in December 2021, CISA Director Jen Easterly said that it is the “most serious” vulnerability she has …

MITRE ATT&CK
Mapping ATT&CK techniques to CVEs should make risk assessment easier

Vulnerability reporters should start using MITRE ATT&CK technique references to describe what the attacker is trying to achieve by exploiting a given CVE-numbered …

Cybersecurity risk management
While businesses are ramping up their risk mitigation efforts, they could be doing more

Zurich North America and Advisen have released a survey of corporate risk managers and insurance buyers revealing current views about information security and cyber risk …

Don't miss

Cybersecurity news