CISO

Enterprises should layer-up security to avoid legal repercussions

Enterprises should layer-up security to avoid legal repercussions 26/07/2023 at 08:03 By Help Net Security The role of CISO these days requires a strong moral compass: You have to be the one speaking up for the protection of customer data and be ready to handle uncomfortable situations such as pressure to downplay an actual breach. […]

React to this headline:

Loading spinner

Enterprises should layer-up security to avoid legal repercussions Read More »

Average cost of a data breach reaches $4.45 million in 2023

Average cost of a data breach reaches $4.45 million in 2023 24/07/2023 at 11:18 By Help Net Security IBM released its annual Cost of a Data Breach Report, showing the global average cost of a data breach reached $4.45 million in 2023 – an all-time high for the report and a 15% increase over the

React to this headline:

Loading spinner

Average cost of a data breach reaches $4.45 million in 2023 Read More »

Strengthening the weakest links in the digital supply chain

Strengthening the weakest links in the digital supply chain 24/07/2023 at 07:05 By Help Net Security In this Help Net Security video, Marc Gaffan, CEO at IONIX, discusses how businesses’ biggest cybersecurity mistake is not protecting the full external attack surface that continues to expand to include a businesses’ entire digital supply chain. This is

React to this headline:

Loading spinner

Strengthening the weakest links in the digital supply chain Read More »

How healthcare organizations should measure their device security success

How healthcare organizations should measure their device security success 21/07/2023 at 07:04 By Help Net Security In this Help Net Security video, Chris Westphal, Head of Product Marketing at Ordr, discusses how healthcare organizations should measure their device security success and where they should be concentrating their future security investments. The post How healthcare organizations

React to this headline:

Loading spinner

How healthcare organizations should measure their device security success Read More »

What to do (and what not to do) after a data breach

What to do (and what not to do) after a data breach 19/07/2023 at 07:02 By Help Net Security Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at

React to this headline:

Loading spinner

What to do (and what not to do) after a data breach Read More »

CISOs under pressure: Protecting sensitive information in the age of high employee turnover

CISOs under pressure: Protecting sensitive information in the age of high employee turnover 17/07/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust principles, identity access management, and managed security services are crucial for

React to this headline:

Loading spinner

CISOs under pressure: Protecting sensitive information in the age of high employee turnover Read More »

Combatting data governance risks of public generative AI tools

Combatting data governance risks of public generative AI tools 13/07/2023 at 08:02 By Help Net Security When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or the accidental exposure of proprietary information can lead to reputational damage, legal

React to this headline:

Loading spinner

Combatting data governance risks of public generative AI tools Read More »

Attack Surface Management: Identify and protect the unknown

Attack Surface Management: Identify and protect the unknown 13/07/2023 at 07:33 By Help Net Security In this Help Net Security video, Brianna McGovern, Product Manager, Attack Surface Management, NetSPI, discusses Attack Surface Management (ASM). Attack Surface Management detects known, unknown, and potentially vulnerable public-facing assets and changes to your attack surface that may introduce risk.

React to this headline:

Loading spinner

Attack Surface Management: Identify and protect the unknown Read More »

CISO Conversations: CISOs of Identity Giants IDEMIA and Ping

CISO Conversations: CISOs of Identity Giants IDEMIA and Ping 12/07/2023 at 17:02 By Kevin Townsend SecurityWeek talks to Dennis Kallelis (CSO at Idemia) and Jason Kees (CISO at Ping), two of industry’s identity giants. The idea, as always, is to discuss the role of the modern CISO. The post CISO Conversations: CISOs of Identity Giants

React to this headline:

Loading spinner

CISO Conversations: CISOs of Identity Giants IDEMIA and Ping Read More »

CISO perspective on why Boards don’t fully grasp cyber attack risks

CISO perspective on why Boards don’t fully grasp cyber attack risks 11/07/2023 at 07:33 By Mirko Zorz Due to their distinct perspectives, Board members and CISOs often have differing views on cyber attack risks. The discrepancy arises when Boards need cybersecurity expertise, need help comprehending technical jargon, or when CISOs need to communicate in business

React to this headline:

Loading spinner

CISO perspective on why Boards don’t fully grasp cyber attack risks Read More »

Cybersecurity best practices while working in the summer

Cybersecurity best practices while working in the summer 11/07/2023 at 07:02 By Help Net Security IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how employees

React to this headline:

Loading spinner

Cybersecurity best practices while working in the summer Read More »

How ransomware impacts the healthcare industry

How ransomware impacts the healthcare industry 05/07/2023 at 07:02 By Help Net Security Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net Security video, Steve Gwizdala, VP of Healthcare at ForgeRock, discusses how vigilance and new ways

React to this headline:

Loading spinner

How ransomware impacts the healthcare industry Read More »

The rise in cyber extortion attacks and its impact on business security

The rise in cyber extortion attacks and its impact on business security 03/07/2023 at 07:08 By Help Net Security In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A recent report revealed that cyber extortion activity reached

React to this headline:

Loading spinner

The rise in cyber extortion attacks and its impact on business security Read More »

Unlocking internet’s secrets via monitoring, data collection, and analysis

Unlocking internet’s secrets via monitoring, data collection, and analysis 30/06/2023 at 05:05 By Mirko Zorz In this Help Net Security interview, Ryan Woodley, CEO of Netcraft, discusses the importance of monitoring, collecting, and analyzing internet data to gain a profound understanding of the internet. This insight plays a vital role in protecting and empowering customers.

React to this headline:

Loading spinner

Unlocking internet’s secrets via monitoring, data collection, and analysis Read More »

Micropatches: What they are and how they work

Micropatches: What they are and how they work 29/06/2023 at 07:02 By Help Net Security In this Help Net Security video, Mitja Kolsek, CEO at Acros Security, discusses micropatches, a solution to a huge security problem. With micropatches, there are no reboots or downtime when patching and no fear that an official update will break

React to this headline:

Loading spinner

Micropatches: What they are and how they work Read More »

Preparing health systems for cyber risks and insurance coverage

Preparing health systems for cyber risks and insurance coverage 28/06/2023 at 07:32 By Mirko Zorz Our healthcare systems are at risk of infiltration by threat actors, potentially disrupting services, compromising sensitive data, and even jeopardizing patient outcomes. Among the people addressing these challenges is Dennis Fridrich, VP of Cybersecurity at TRIMEDX, who not only understands

React to this headline:

Loading spinner

Preparing health systems for cyber risks and insurance coverage Read More »

How cyber insurance empowers CISOs

How cyber insurance empowers CISOs 27/06/2023 at 07:03 By Help Net Security In this Help Net Security video, Fawaz Rasheed, Field CISO at VMware, discusses how cyber insurance remains the high tide that rises ships. For organizations choosing to purchase cyber insurance, the requirements set forth towards them are beneficial in advancing their security program.

React to this headline:

Loading spinner

How cyber insurance empowers CISOs Read More »

Exploring the persistent threat of cyberattacks on healthcare

Exploring the persistent threat of cyberattacks on healthcare 26/06/2023 at 07:38 By Mirko Zorz In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts of cyberattacks on healthcare institutions and what healthcare providers can do to protect patients’ personal data and medical devices. Can you

React to this headline:

Loading spinner

Exploring the persistent threat of cyberattacks on healthcare Read More »

How hardening Microsoft 365 tenants mitigates potential cloud attacks

How hardening Microsoft 365 tenants mitigates potential cloud attacks 26/06/2023 at 07:01 By Help Net Security Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack modeling—not to mention the deployment of measurable controls to defend against these

React to this headline:

Loading spinner

How hardening Microsoft 365 tenants mitigates potential cloud attacks Read More »

Security investments that help companies navigate the macroeconomic climate

Security investments that help companies navigate the macroeconomic climate 23/06/2023 at 07:01 By Help Net Security As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must immediately enact cybersecurity solutions that are right for them. Every enterprise is unique, so

React to this headline:

Loading spinner

Security investments that help companies navigate the macroeconomic climate Read More »

Scroll to Top