cybersecurity
The cybersecurity issues organizations deal with remain complex and numerous
New thinking on cybersecurity policies, processes, people and products are necessary for organizations to reverse perceptions, and perhaps realities, that they are falling …
Domain security remains an underutilized component to curb attacks
Despite the shift to modernize business environments and operations among the Global 2000 companies, web domains remain dangerously under protected, according to CSC. CSC’s …
Combating vulnerability fatigue with automated security validation
Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two …
Do you have a plan for your cybersecurity career? Time to skill up!
Gerald Auger is a Managing Partner at Coastal Information Security Group, and Chief Content Creator at Simply Cyber. In this interview with Help Net Security, he talks about …
Erosion of digital trust: Consumers want more personal information protection
Consumers think banks, retailers and mobile operators need to do more to protect them and their personal information from fraudsters, according to Callsign. Trust in these …
Content sprawl is increasing the risk of data breaches and leaks
Egnyte’s latest report, based on a survey of 400 IT executives, examines the challenges of securing and governing unstructured content in today’s hybrid and remote work …
How cybercrime hurts some groups more than others
Trends in cybercrime mirror the widening digital divide accelerated by the pandemic leaving lower income and vulnerable audiences disproportionally impacted. A new report by …
Evolving beyond RBAC: Why ABAC is the future
In the advent of a “work anywhere, anytime” environment, enterprises face a rapid expansion of diverse users alongside an influx of applications, devices, APIs and …
How much trust should we place in the security of biometric data?
An increasing number of people around the world are being displaced by factors such as climate change, natural disasters, and wars. The people attempting to cross …
C-level execs confident in their software supply chain security, but challenges remain
A survey of C-level executives released by CloudBees reveals high confidence levels in software supply chain security but a limited understanding of the essential components …
Ransomware attacks on the rise – How to counter them?
In June 2012, Deloitte conducted an online survey of 50 C-suite and other executives about cyber threat detection and response and found that almost 87% of the pollees …
Official (ISC)² CISSP CBK Reference: Out with the old, in with the new
Arthur Deane is a Senior Director at Capital One Financial, where he leads cybersecurity activities in the Card division. He is also the co-author of the Official (ISC)² CISSP …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)