Please turn on your JavaScript for this page to function normally.
eavesdropping
How businesses are prioritizing data privacy

In 2021, the demand for data privacy jobs soared with no indication of slowing down and stemming from the proliferation of new government regulations and cloud migration. In …

shield
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have …

strategy
Trends to watch when creating security strategy for the next two years

Executive performance evaluations will be increasingly linked to ability to manage cyber risk; almost one-third of nations will regulate ransomware response within the next …

tools
iPaaS: The latest enterprise cybersecurity risk?

iPaaS apps are vulnerable because they transport highly sensitive data from core systems, include many different third-party apps in the process, and often lack security tools …

idea
How companies are prioritizing infosec and compliance

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for …

network
Despite known security issues, VPN usage continues to thrive

VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a new …

up
Rate of IT security incidents grows with company size

The rate of IT security incidents increases the more Microsoft 365 security features are used, according to Hornetsecurity. Organizations using Microsoft 365 and that use 1 or …

Door
How the blurring of the “supply chain” opens your doors to attackers—and how you can close them

There have been more than 200 dedicated supply chain attacks over the past decade. Some of these campaigns have affected countless supplier networks and millions of customers …

SaaS
SaaS security: How to avoid “death by 1000 apps”

SaaS applications have become synonymous with modern business environments, and CISOs and security teams struggle to find a happy medium between ensuring the security of their …

organize
Recovery and resilience: CISO insights into the 2022 cybersecurity landscape

I recently had the opportunity to meet and speak with several luminaries of the global security ecosystem: Roger Hale – Chief Security Officer at Agora; Sounil Yu …

John Shier
Attackers aren’t slowing down, here’s what researchers are seeing

In this Help Net Security interview, John Shier, Senior Security Advisor at Sophos, talks about the main findings of two Sophos reports: the 2022 Active Adversary Report and …

Mehul Revankar
Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level

In this interview for Help Net Security, Mehul Revankar, VP of Product Management & Engineering for VMDR at Qualys, talks about Qualys Vulnerability Management, Detection …

Don't miss

Cybersecurity news