
Five proven techniques for building effective fraud management
Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association of Certified Fraud Examiners’ …

How CISOs plan to accelerate the adoption of automation
ThreatQuotient released the State of Cyber Security Automation Adoption in 2021, new research focused on understanding the importance, challenges and trends facing businesses …

The cybersecurity issues organizations deal with remain complex and numerous
New thinking on cybersecurity policies, processes, people and products are necessary for organizations to reverse perceptions, and perhaps realities, that they are falling …

Domain security remains an underutilized component to curb attacks
Despite the shift to modernize business environments and operations among the Global 2000 companies, web domains remain dangerously under protected, according to CSC. CSC’s …

Combating vulnerability fatigue with automated security validation
Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two …

Do you have a plan for your cybersecurity career? Time to skill up!
Gerald Auger is a Managing Partner at Coastal Information Security Group, and Chief Content Creator at Simply Cyber. In this interview with Help Net Security, he talks about …

Ransomware attacks on the rise – How to counter them?
In June 2012, Deloitte conducted an online survey of 50 C-suite and other executives about cyber threat detection and response and found that almost 87% of the pollees …

How to avoid the pitfalls of multi-cloud strategy deployment
Making the decision to implement a multi-cloud strategy is difficult. From the decision to pursue a multi-cloud journey to defining the requirements to laying the foundation …

OWASP Top 10 2021: The most serious web application security risks
The definitive OWASP Top 10 2021 list is out, and it shows that broken access control is currently the most serious web application security risk. How is the list compiled? …

US agricultural co-op hit by ransomware, expects food supply chain disruption
New Cooperative Inc., an agricultural cooperative owned by Iowa corn and soy farmers, has been hit by the BlackMatter ransomware group. The attackers are asking the co-op to …

The complexities of vulnerability remediation and proactive patching
In this interview with Help Net Security, Eran Livne, Director, Product Management, Endpoint Remediation at Qualys, discusses vulnerability remediation complexity, the …

9 tips to avoid cloud configuration conundrums
Configuration-related errors continue to result in avoidable losses of customer data and, consequently, their trust and loyalty, as well as revenue. The recent T-Mobile breach …