cybersecurity

Calling on business leaders to ensure CISOs are part of the C-suite decision making process
Organizations across the world have made strides in remote working and collaboration during the COVID-19 pandemic, but the proliferation of digitization is creating …

Connected devices increasingly at risk as new ransomware attacks are reported almost daily
Ordr released a report on the state of connected devices. The 2021 study addresses pandemic-related cybersecurity challenges, including the growth of connected devices and …

While IT budget allocations for cybersecurity are significant, data breaches still very common
While IT security decision makers often consider cyberattacks a serious concern and are allocating a significant share of their IT budget to address their cybersecurity …

Audit process or project changes leading to control gaps, creating risks
A survey of 200 audit business partners revealed that 56% of respondents said they were facing more changes in the last two years, and a large majority agreed these changes …

Zero trust: Bringing security up to speed for the work-from-anywhere age
The Internet Age has changed so much of how we live and work. We have become accustomed to buying goods online with a few clicks and having them delivered overnight, and out …

Risky business: Steps for building an effective GRC program
Organizations across the board are facing governance, risk, and compliance (GRC)-related challenges. This is due to an over-management of GRC programs and the deployment and …

Cybersecurity is hands-on learning, but everyone must be on the same page
In this interview with Help Net Security, Amanda L. Joyce, Group Leader, Strategic Cybersecurity Analysis & Research, Argonne National Laboratory, offers her unique …

Fraudsters increasingly focusing on digital accounts, whether existing or fake ones
Fraudsters are increasingly focusing on digital accounts, whether that is by compromising existing user accounts or creating fake new accounts to commit fraud, an Arkose Labs …

Organizations aware of the importance of zero trust, yet still relying on passwords
Organizations have become more security conscious over the course of the pandemic, leading them to invest heavily in zero trust, according to a study from identity firm Okta. …

Cyberattacks on the rise, organizations increasingly interested in defensive technologies
Cyberattacks against enterprise infrastructure are on the rise in the U.K. as digital transformation expands the digital footprints—and the potential attack surfaces—of many …

Can XDR bring the kill chain back to its roots?
When Lockheed Martin engineers first came up with the cyber kill chain concept, the purpose was clear – to mitigate or eliminate a cyberattack. It borrowed from military …

The evolution of identity-first security
Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN …
Featured news
Resources
Don't miss
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies