CISO

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element 2024-05-02 at 08:31 By Help Net Security The exploitation of vulnerabilities as an initial point of entry almost tripled from the previous year, accounting for 14% of all breaches, according to Verizon’s 2024 Data Breach Investigations Report, which analyzed a record-high 30,458 security […]

React to this headline:

Loading spinner

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element Read More »

CISO Conversations: Talking Cybersecurity With LinkedIn’s Geoff Belknap and Meta’s Guy Rosen

CISO Conversations: Talking Cybersecurity With LinkedIn’s Geoff Belknap and Meta’s Guy Rosen 2024-05-01 at 15:31 By Kevin Townsend SecurityWeek interviews Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta. The post CISO Conversations: Talking Cybersecurity With LinkedIn’s Geoff Belknap and Meta’s Guy Rosen appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

CISO Conversations: Talking Cybersecurity With LinkedIn’s Geoff Belknap and Meta’s Guy Rosen Read More »

Security analysts believe more than half of tasks could be automated

Security analysts believe more than half of tasks could be automated 2024-04-30 at 06:01 By Help Net Security Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI expected to boost threat detection In fact, security analysts maintain that up to 57%

React to this headline:

Loading spinner

Security analysts believe more than half of tasks could be automated Read More »

Should Cybersecurity Leadership Finally be Professionalized?

Should Cybersecurity Leadership Finally be Professionalized? 2024-04-29 at 18:31 By Kevin Townsend The majority opinion is that a cybersecurity professional body is long overdue and would benefit cybersecurity and cybersecurity practitioners. The post Should Cybersecurity Leadership Finally be Professionalized? appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Should Cybersecurity Leadership Finally be Professionalized? Read More »

The key pillars of domain security

The key pillars of domain security 2024-04-19 at 07:01 By Help Net Security From branded emails and marketing campaigns to critical protocols, internal portals, and internet traffic, domains are central to digital enterprise operations. They are constantly created for new assets and initiatives. In this Help Net Security video, Mark Flegg, Global Director of Security

React to this headline:

Loading spinner

The key pillars of domain security Read More »

51% of enterprises experienced a breach despite large security stacks

51% of enterprises experienced a breach despite large security stacks 2024-04-19 at 06:31 By Help Net Security Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, according

React to this headline:

Loading spinner

51% of enterprises experienced a breach despite large security stacks Read More »

92% of enterprises unprepared for AI security challenges

92% of enterprises unprepared for AI security challenges 2024-04-18 at 07:02 By Help Net Security Most industries continue to run almost two or more months behind in patching software vulnerabilities, endpoints remain vulnerable to threats, and most enterprise PCs must be replaced to support AI-based technologies, according to the Absolute Security Cyber Resilience Risk Index

React to this headline:

Loading spinner

92% of enterprises unprepared for AI security challenges Read More »

Geopolitical tensions escalate OT cyber attacks

Geopolitical tensions escalate OT cyber attacks 2024-04-15 at 07:31 By Mirko Zorz In this Help Net Security interview, Andrew Ginter, VP of Industrial Security at Waterfall Security, discusses operational technology (OT) cyber attacks and their 2024 Threat Report. He examines how global geopolitical tensions and evolving ransomware tactics are reshaping industrial cybersecurity. He sheds light

React to this headline:

Loading spinner

Geopolitical tensions escalate OT cyber attacks Read More »

Cyber attacks on critical infrastructure show advanced tactics and new capabilities

Cyber attacks on critical infrastructure show advanced tactics and new capabilities 2024-04-03 at 07:01 By Mirko Zorz In this Help Net Security interview, Marty Edwards, Deputy CTO OT/IoT at Tenable, discusses the impact of geopolitical tensions on cyber attacks targeting critical infrastructure. Edwards highlights the need for collaborative efforts between policymakers, government agencies, and the

React to this headline:

Loading spinner

Cyber attacks on critical infrastructure show advanced tactics and new capabilities Read More »

The Complexity and Need to Manage Mental Well-Being in the Security Team

The Complexity and Need to Manage Mental Well-Being in the Security Team 2024-03-29 at 14:46 By Kevin Townsend It is the CISO’s responsibility to build and maintain a high functioning team in a difficult environment – cybersecurity is a complex, continuous, and adversarial environment like none other outside of military conflict. The post The Complexity

React to this headline:

Loading spinner

The Complexity and Need to Manage Mental Well-Being in the Security Team Read More »

How CISOs tackle business payment fraud

How CISOs tackle business payment fraud 2024-03-28 at 07:01 By Help Net Security In this Help Net Security video, Shai Gabay, CEO of Trustmi, discusses why payments are a source of cyber worry for CISOs. CISOs are worried about Business Email Compromise (BEC), cyber attackers’ use of AI, and securing the supply chain. These are

React to this headline:

Loading spinner

How CISOs tackle business payment fraud Read More »

How security leaders can ease healthcare workers’ EHR-related burnout

How security leaders can ease healthcare workers’ EHR-related burnout 2024-03-27 at 08:05 By Help Net Security Staff experiencing burnout in healthcare settings is not something that security leaders typically worry about – unless, maybe, it is the security team itself that is suffering from it. Healthcare CISOs and privacy officers worry more about the confidentiality

React to this headline:

Loading spinner

How security leaders can ease healthcare workers’ EHR-related burnout Read More »

Reinforcement learning is the path forward for AI integration into cybersecurity

Reinforcement learning is the path forward for AI integration into cybersecurity 2024-03-26 at 08:01 By Help Net Security AI’s algorithms and machine learning can cull through immense volumes of data efficiently and in a relatively short amount of time. This is instrumental to helping network defenders sift through a never-ending supply of alerts and identify

React to this headline:

Loading spinner

Reinforcement learning is the path forward for AI integration into cybersecurity Read More »

8 cybersecurity predictions shaping the future of cyber defense

8 cybersecurity predictions shaping the future of cyber defense 2024-03-25 at 07:32 By Help Net Security Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI (GenAI). Two-thirds of global 100 organizations are expected to extend directors’ and officers’ insurance

React to this headline:

Loading spinner

8 cybersecurity predictions shaping the future of cyber defense Read More »

95% of companies face API security problems

95% of companies face API security problems 2024-03-22 at 06:31 By Help Net Security Despite the critical role of APIs, the vast majority of commercial decision-makers are ignoring the burgeoning security risk for businesses, according to Fastly. Application Programming Interfaces (APIs) have long been recognised as a bedrock of the digital economy and recent figures

React to this headline:

Loading spinner

95% of companies face API security problems Read More »

Fake data breaches: Countering the damage

Fake data breaches: Countering the damage 2024-03-21 at 08:01 By Help Net Security Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum claimed to have stolen data

React to this headline:

Loading spinner

Fake data breaches: Countering the damage Read More »

Webinar Today: CISO Strategies for Boardroom Success

Webinar Today: CISO Strategies for Boardroom Success 2024-03-13 at 14:35 By SecurityWeek News You’re invited join SecurityWeek and Gutsy for the webinar, “From Protector to Influencer: CISO Strategies for Boardroom Success,” as we address the emerging responsibilities for the CISO role. The post Webinar Today: CISO Strategies for Boardroom Success appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Webinar Today: CISO Strategies for Boardroom Success Read More »

10 free cybersecurity guides you might have missed

10 free cybersecurity guides you might have missed 2024-03-11 at 09:07 By Help Net Security This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and organizations. Whether you work for a small business, a large corporation, or a specific industry,

React to this headline:

Loading spinner

10 free cybersecurity guides you might have missed Read More »

How to create an efficient governance control program

How to create an efficient governance control program 2024-03-06 at 06:31 By Help Net Security Your success as an organization, especially in the cyber realm, depends on your security posture. To account for the ongoing evolution of digital threats, you need to implement robust governance control programs that address the current control environment and help

React to this headline:

Loading spinner

How to create an efficient governance control program Read More »

Organizations are knowingly releasing vulnerable applications

Organizations are knowingly releasing vulnerable applications 2024-03-05 at 06:18 By Help Net Security 92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for application security has shifted away from dedicated

React to this headline:

Loading spinner

Organizations are knowingly releasing vulnerable applications Read More »

Scroll to Top