Please turn on your JavaScript for this page to function normally.
security culture
5 tips for building a culture of cybersecurity accountability

In this Help Net Security video, Corey Nachreiner, CSO at WatchGuard, talks about how effective cybersecurity often boils down to doing the basics: patching, updating, and …

insider threat
3 major threat detection methods explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by …

gap
How companies can avoid costly data breaches

IBM found that it takes on average 277 days to discover a security breach and costs businesses an average of $4.35 million per breach. Moreover, the time-to-discovery can …

ransomware
Preventing a ransomware attack with intelligence: Strategies for CISOs

Bad news first: Ransomware isn’t going anywhere. The good news? The right intelligence can help organizations dramatically reduce risk surrounding a cyber extortion event. In …

approved
7 reasons why you must embed trust into the core of your business

As organizational trust becomes a top priority for companies of all sizes and industries, a new OneTrust report highlights seven key industry trends relevant to privacy, …

CISA free resources
5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and …

cloud
Cybersecurity implications of using public cloud platforms

According to a recent Node4 report, IT managers have a generally positive view of public cloud platforms. Half of the respondents said that, despite benefits, they have had to …

bot
Robotic Process Automation (RPA) adoption hindered by security concerns

Robotic Process Automation (RPA) promises numerous benefits to organizations investing in it, including increased worker productivity, the automation of tedious and monotonous …

biohazard
5 use cases with a malware sandbox

Malware attacks are commonplace today, executing within minutes and causing damage for weeks or months. Rapid detection and swift, effective incident response are essential in …

arrows
Stop audience hijacking and defend against redirection to malicious websites

The holidays are just around the corner, and the competition for consumer attention and dollars promises to be fierce. According to Akamai research, up to 20% of potential …

identity theft
Personal cybersecurity is now a company problem

As work and personal lives have almost merged into one, threat actors are increasingly targeting people because of their work lives, and cybersecurity needs to adapt to the …

compliance
Compliance initiatives can advance your organization’s security journey

Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at …

Don't miss

Cybersecurity news