Please turn on your JavaScript for this page to function normally.
Law legislation
The evolving role of the lawyer in cybersecurity

Cybersecurity is one of the most dynamic fields of law. Long gone are the days when organizations could rely entirely on defensive measures within their own environments for …

Brian Dye
Are separate SIEMs for threat hunting a good idea?

In this interview with Help Net Security, Brian Dye, CEO at Corelight, talks about the trend of creating separate SIEMs for threat hunting and why this is not achieveable for …

risk
Extracting value from the interconnected network of risk management

From the CISO to the SOC operator, defenders struggle to maintain complete situational awareness. Holistic approaches to risk management require the implementation of a …

Daniel Clayton
Automation is not here to close the cybersecurity skills shortage gap, but it can help

In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the …

ransomware
Ransomware preparedness is low despite executives’ concerns

86.7% of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent …

attacks
Attackers rapidly adopting new techniques to target users

Zix announced the release of a report which finds attackers are rapidly adopting new techniques to target users. “Cybercrime is exploding in 2021 and if there is anything that …

attacks
50% of cybersecurity attacks are from repeat offenders

Lack of awareness and gaps in knowledge are a weak link for cybersecurity leadership who are responsible for strategic planning of cybersecurity defenses, leaving …

identity theft
Reformulating the cyber skills gap

Despite a positive (and significant) decrease from over 4 million unfilled cybersecurity jobs in 2019, there is still a staggering 3.12 million global shortage of workers with …

email
What happens after a malicious email reaches employees’ inboxes?

On average, it takes three and half days (83 hours) from the moment a malicious email attack lands in an employees inbox, to when it is discovered by a security team or …

AWS
Detecting attackers obfuscating their IP address inside AWS

Security researchers have documented an attack technique that may allow attackers to leverage a legitimate Amazon VPC feature to mask their use of stolen API credentials …

search
Cyber investigations, threat hunting and research: More art than science

While it’s true that threat hunting, incident response, and threat research all have their foundations in science (operating system theory and architecture, computer language …

Sophos XDR
Sophos XDR: Threat hunting through the entire security ecosystem

Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading …

Don't miss

Cybersecurity news