Please turn on your JavaScript for this page to function normally.
brain
10 best practices to reduce the probability of a material breach

ThoughtLab announced the findings of its 2022 cybersecurity benchmarking study which analyzed the cybersecurity strategies and results of 1,200 large organizations across 14 …

shield
An offensive mindset is crucial for effective cyber defense

As ransomware attacks continue to increase and cybercriminals are becoming more sophisticated, the federal government has implemented a more proactive approach when it comes …

Threats to hardware security are growing

Hardware attacks are becoming more and more sophisticated. There are several reasons this could be happening: Security increasingly supported in hardware – Mistakes can …

woman
Funding women-led cybersecurity startups: Where are we at?

In 2020, cybersecurity companies raised $8.9 billion globally, and in 2021 the amount jumped (significantly) to over $21 billion. While the data is very exciting and promising …

Dimitri van Zantvliet Rozemeijer
Data centers on steel wheels: Can we trust the safety of the railway infrastructure?

In this interview for Help Net Security, Dimitri van Zantvliet Rozemeijer, CISO at Nederlandse Spoorwegen (Dutch Railways), talks about railway cybersecurity and the …

chain
NIST updates guidance for cybersecurity supply chain risk management

The National Institute of Standards and Technology (NIST) has updated its guidance document for helping organizations identify, assess and respond to cybersecurity risks …

Spear phishing
Nothing personal: Training employees to identify a spear phishing attack

Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide …

shadow
Tackling the threats posed by shadow IT

While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust …

Healthcare
A checklist to help healthcare organizations respond to a serious cyberattack

How should organizations in the healthcare sector respond to outage due to a serious cyberattack? The Healthcare and Public Health Sector Coordinating Council’s (HSCC) …

person
Self-promotion in cybersecurity: Why you should do it, and how

The cybersecurity market is hot! In 2021 Pinpoint Search Group recorded 300 funding rounds invested into cybersecurity vendors that added up to over $20 billion. 158 of those …

shield
The 6 steps to a successful cyber defense

The Ransomware Spotlight Year-End Report from Ivanti, conducted in partnership with Cyber Security Works and Cyware, found that there is now a total of 157 ransomware families …

RSA Conference
RSAC Innovation Sandbox Contest finalists announced

RSA Conference announced the 10 finalists for its 17th annual RSAC Innovation Sandbox Contest. The competition calls on the most promising young companies in cybersecurity to …

Don't miss

Cybersecurity news