Please turn on your JavaScript for this page to function normally.
The challenges of achieving ISO 27001

ISO 27001 is a widely-known international standard on how to manage information security. In this Help Net Security video, Nicky Whiting, Director of Consultancy, Defense.com, …

shield
Defeat social engineering attacks by growing your cyber resilience

In this Help Net Security video, Grayson Milbourne, Security Intelligence Director at OpenText Security Solutions, discusses the innovation behind social engineering campaigns …

Government guide for supply chain security: The good, the bad and the ugly

Just as developers and security teams were getting ready to take a breather and fire up the BBQ for the holiday weekend, the U.S.’s most prestigious security agencies (NSA, …

criminal
Use of machine identities is growing in state-sponsored cyberattacks

66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been …

SaaS
Companies underestimate number of SaaS applications in their environment

A new research study focused on SaaS usage among enterprises across the USA, UK, and Europe, highlights a striking difference between consumption and security of SaaS …

innovation
CIOs find it most difficult to solve cybersecurity challenges

A global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as well as …

organize
7 metrics to measure the effectiveness of your security operations

Given inflation and economic uncertainty, the cybersecurity industry is starting to experience budget cuts, despite a surge in ransomware attacks. As more budgets are going …

gap
How Just-in-Time privilege elevation prevents data breaches and lateral movement

Are inadequate security policies for privileged access making you highly vulnerable to security breaches and ransomware attacks? In the weeks that followed the high-profile …

Companies struggle to govern their new cloud environments

Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …

ransomware payments
Should ransomware payments be banned? A few considerations

Several U.S. states have recently moved to ban local and state agencies and organizations funded by taxpayers’ dollars from paying off ransomware gangs, and a few more …

BEC scams
How BEC attacks on human capital management systems are increasing

In this Help Net Security video, Jon Hencinski, VP of Security Operations at Expel, talks about how their SOC team has recently observed Business Email Compromise (BEC) …

People
Creating cyber career opportunities during the talent shortage

With roughly 700,000 cybersecurity positions open, businesses across America are feeling the direct impact of the cyber talent shortage. As ransomware attacks and data …

Don't miss

Cybersecurity news