
Understanding your attack surface is key to recognizing what you are defending
In this interview with Help Net Security, Marc Castejon, CEO at Silent Breach, discusses what organizations should be worried about at the moment, and what technologies they …

6 ways your cloud data security policies are slowing innovation – and how to avoid that
As practically every organization shifts from managing their data in network-based data centers to storing it in the cloud, cloud data security policies are created to secure …

Machine learning creates a new attack surface requiring specialized defenses
Machine learning (ML) inputs and outputs are becoming more widely available to customers thanks to organizations in almost every sector integrating artificial intelligence …

How to minimize your exposure to supply chain attacks
Supply chain attacks are on the rise, and many organizations seem unsure on how to respond to the threat, but I’m here to tell you that there are several steps you can take to …

How to spot deep-faked candidates during interviews
The FBI recently issued a warning that malicious attackers are using deepfakes to apply for a variety of remote work positions via virtual interviews over the internet. These …

How AI and cybersecurity complement each other
As the modern world evolves, more threats arise. Knowledge of cybersecurity and artificial intelligence (AI) has become crucial to a successful business. Businesses everywhere …

Why there is no quick fix for cyber attacks
Cybersecurity threats keep evolving, meaning that most, if not all, organizations could be dangerously exposed as the digital ecosystem develops. While some organizations …

Kubernetes security: Shift-left strategies and simplifying management
Kubernetes (K8s) is undoubtedly on the rise. According to the State of Cloud Development report by SlashData, this open-source container orchestration platform is already …

The future of attack surface management (ASM)
The legacy approach to attack surface management falls short of what modern organizations require: contextual awareness. Security teams increasingly suffer from threat …

Minimizing risk: Key cybersecurity-related M&A considerations
Global M&A hit new highs in 2021 reaching an eye-popping $5.1 trillion in total deal value, according to PwC. With economic headwinds leaving acquisition as the only …

How to identify and combat online fraud
As the popularity of Buy Now, Pay Later (BNPL) grows, organizations and consumers must remain vigilant or risk becoming a victim of fraud, as account takeover attacks – where …

The importance of secure passwords can’t be emphasized enough
Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on