Please turn on your JavaScript for this page to function normally.
biohazard
5 critical questions to test your ransomware preparedness

I’m a pentester – that is, a professional penetration tester. Some call me an ethical hacker, a white hat, or red teamer. In the heat of the moment, I’ve been called much …

endpoint protection
Why EDR is not sufficient to protect your organization

Endpoint detection and response (EDR) tools are a cornerstone of most cybersecurity defenses today. But while the technology has an important role to play in investigating …

Stephen Carter
Why a modern vulnerability management strategy requires state-of-the-art solutions

In this interview with Help Net Security, Stephen Carter, CEO at Nucleus Security, explains the importance of having a vulnerability management strategy within an …

struggle
How frustrated and burned out are security analysts?

Security analysts play a vital role ensuring that their organizations stay safe and secure. But barriers to their work, like a lack of staff, overwork, and tedious tasks are …

ransomware
What is Ransomware Protection as a Service?

Ransomware attacks have devastating consequences for many businesses. Those go beyond the monetary loss tied to ransom-encrypted data, and include disrupted operations, …

data
To shift to data-driven security decision making: Start with the right data

We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …

Scott Laliberte
AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset

In this interview with Help Net Security, Scott Laliberte, Managing Director at Protiviti, talks about the implementation of AI and ML in cybersecurity programs, why this is a …

2022
2022 promises to be a challenging year for cybersecurity professionals

I am very glad to turn the page on 2021, however, I am not optimistic that 2022 will be remarkably better. I am hopeful that President Biden’s Executive Order 14028 and the …

virtual reality
How can SMBs extend their SecOps capabilities without adding headcount?

Which is more important for achieving organizational cybersecurity: security products or security people? The right answer to this (trick) question is that both are equally …

certification
Ducen completes SOC 1 Type I compliance to protect customers’ data against breaches and cyber attacks

Ducen announces the successful completion of its SOC 1 Type I compliance. This attestation shows the company’s commitment to protecting their customers’ data and …

search
Siloed security data hamper the ability to achieve collective defense

Cyware revealed a research detailing the challenges affecting modern security operations teams and the negative business impact of siloed security operations. According to the …

HITRUST adds two offerings to aid in understanding control effectiveness and cyber preparedness

HITRUST announced a major expansion of its assessment portfolio to raise the quality and efficiency of assurances across the spectrum of information assurance needs. HITRUST …

Don't miss

Cybersecurity news