Please turn on your JavaScript for this page to function normally.
arrows
Finance data management initiatives constrained by lack of digital skills and maturity

Data management initiatives in the finance sector, such as data collection, integration, and automation, are being constrained by a severe lack of digital skills and maturity. …

ransomware
Add a new dimension to ransomware defenses

Ransomware is a particularly heartless endeavor. Criminals have targeted schools, vital infrastructure, and even patient records at a psychiatric treatment facility. The US …

drown
Cybersecurity shortcomings exposed by the pandemic

SecureAge announced the release of its study which polled 200 employers and 400 employees from around the UK business world during Q3 2021, and examined key cybersecurity …

money
How to maximize your security budget while demonstrating ROI

The 2021 Positive Technologies Cybersecurity Threatscape report revealed that cyber attacks remain on the rise in the post-pandemic world, increasing by 17% compared to 2020. …

burn
One in three IT security managers don’t have a formal cybersecurity incident response plan

Regardless of industry, information security incidents have become more of a targeted threat for businesses, increasing in amount and efficacy, according to the 2021 Data …

gears
How CISOs plan to accelerate the adoption of automation

ThreatQuotient released the State of Cyber Security Automation Adoption in 2021, new research focused on understanding the importance, challenges and trends facing businesses …

chess
The cybersecurity issues organizations deal with remain complex and numerous

New thinking on cybersecurity policies, processes, people and products are necessary for organizations to reverse perceptions, and perhaps realities, that they are falling …

application
Domain security remains an underutilized component to curb attacks

Despite the shift to modernize business environments and operations among the Global 2000 companies, web domains remain dangerously under protected, according to CSC. CSC’s …

shield
Combating vulnerability fatigue with automated security validation

Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two …

Gerald Auger
Do you have a plan for your cybersecurity career? Time to skill up!

Gerald Auger is a Managing Partner at Coastal Information Security Group, and Chief Content Creator at Simply Cyber. In this interview with Help Net Security, he talks about …

innovation
The future role of data, AI and the cloud

The potential for cloud technologies to break down silos and enable more contextualized views of data is having a dramatic impact on enterprise investment priorities for …

Fire
How cybercrime hurts some groups more than others

Trends in cybercrime mirror the widening digital divide accelerated by the pandemic leaving lower income and vulnerable audiences disproportionally impacted. A new report by …

Don't miss

Cybersecurity news