cybersecurity

Cybersecurity posture validation: Fireside chat with Arkadiy Goykhberg, CISO of DMGT
Working in cyber security is an exciting if humbling experience. It is a discipline where you can never have enough details, best practices, and lessons learned by examining …

Proper password security falling short despite increase in online presence
While 92 percent of people know that using the same password or a variation is a risk, 65 percent still re-use passwords across accounts, drastically increasing the risks to …

3 ways any company can guard against insider threats this October
October is Cybersecurity Awareness Month, but most business leaders and consumers don’t need a special event to remember cybersecurity’s preeminence in today’s turbulent …

Consumers will abandon a brand that can’t balance convenience and privacy
The global transformation of daily life has changed how people everywhere interact with brands. With experiences increasingly online, consumers are less tolerant of …

Policy and patience key in Biden’s cybersecurity battle
Last month, President Biden hosted a group of technology and insurance executives to build support for a “whole-of-nation effort” to improve cybersecurity. The executive …

U.S. Department of the Treasury announces set of actions to counter ransomware
As part of the whole-of-government effort to counter ransomware, the U.S. Department of the Treasury announced a set of actions focused on disrupting criminal networks and …

Automation is not here to close the cybersecurity skills shortage gap, but it can help
In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the …

SaaS applications investment growing despite underutilization of app licenses by employees
Business investment in SaaS applications continues to climb despite widespread underutilization of app licenses by employees. According to Productiv’s report, on average only …

Future of work: Cybersecurity and hybrid working as top two enterprise priorities
The pandemic has changed technology priorities for organizations worldwide finds a report from Omdia on the future of work. The top two enterprise priorities are now …

We cannot afford for healthcare security to be the “lowest-hanging fruit”
Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other …

Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings
Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …

Industry trends and insights of CISOs around the world
Marlin Hawk released a research report which explores industry trends and insights of CISOs around the world, the challenges they face in the cybersecurity landscape, as well …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems