CISO

Fake data breaches: Countering the damage

Fake data breaches: Countering the damage 2024-03-21 at 08:01 By Help Net Security Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum claimed to have stolen data […]

React to this headline:

Loading spinner

Fake data breaches: Countering the damage Read More »

Webinar Today: CISO Strategies for Boardroom Success

Webinar Today: CISO Strategies for Boardroom Success 2024-03-13 at 14:35 By SecurityWeek News You’re invited join SecurityWeek and Gutsy for the webinar, “From Protector to Influencer: CISO Strategies for Boardroom Success,” as we address the emerging responsibilities for the CISO role. The post Webinar Today: CISO Strategies for Boardroom Success appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Webinar Today: CISO Strategies for Boardroom Success Read More »

10 free cybersecurity guides you might have missed

10 free cybersecurity guides you might have missed 2024-03-11 at 09:07 By Help Net Security This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and organizations. Whether you work for a small business, a large corporation, or a specific industry,

React to this headline:

Loading spinner

10 free cybersecurity guides you might have missed Read More »

How to create an efficient governance control program

How to create an efficient governance control program 2024-03-06 at 06:31 By Help Net Security Your success as an organization, especially in the cyber realm, depends on your security posture. To account for the ongoing evolution of digital threats, you need to implement robust governance control programs that address the current control environment and help

React to this headline:

Loading spinner

How to create an efficient governance control program Read More »

Organizations are knowingly releasing vulnerable applications

Organizations are knowingly releasing vulnerable applications 2024-03-05 at 06:18 By Help Net Security 92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for application security has shifted away from dedicated

React to this headline:

Loading spinner

Organizations are knowingly releasing vulnerable applications Read More »

How organizations can navigate identity security risks in 2024

How organizations can navigate identity security risks in 2024 2024-02-29 at 07:34 By Mirko Zorz Managing IAM challenges in hybrid IT environments requires a holistic approach, integrating solutions and automating processes to ensure effective access controls and operational efficiency. In this Help Net Security interview, Deepak Taneja, CEO of Zilla Security, discusses identity security risks

React to this headline:

Loading spinner

How organizations can navigate identity security risks in 2024 Read More »

How AI is reshaping the cybersecurity job landscape

How AI is reshaping the cybersecurity job landscape 2024-02-28 at 06:32 By Help Net Security 88% of cybersecurity professionals believe that AI will significantly impact their jobs, now or in the near future, and 35% have already witnessed its effects, according to ISC2’s AI study, AI Cyber 2024. Impact of AI on cybersecurity professionals While

React to this headline:

Loading spinner

How AI is reshaping the cybersecurity job landscape Read More »

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure 2024-02-27 at 08:20 By Help Net Security The National Institute of Standards and Technology (NIST) has updated its widely utilized Cybersecurity Framework (CSF), a key document for mitigating cybersecurity risks. The latest version, 2.0, is tailored to cater to a broad

React to this headline:

Loading spinner

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure Read More »

Active Directory outages can cost organizations $100,000 per day

Active Directory outages can cost organizations $100,000 per day 2024-02-21 at 06:02 By Help Net Security Nearly every organization has core systems services tied to Active Directory that will go down during an outage, according to Cayosoft. Consequences of system downtime for business operations The impact of just one system being down can devastate business

React to this headline:

Loading spinner

Active Directory outages can cost organizations $100,000 per day Read More »

Rise in cyberwarfare tactics fueled by geopolitical tensions

Rise in cyberwarfare tactics fueled by geopolitical tensions 2024-02-14 at 08:02 By Mirko Zorz In this Help Net Security interview, Matt Shelton, Head of Threat Research and Analysis at Google Cloud, discusses the latest Threat Horizons Report, which provides intelligence-derived trends, expertise, and recommendations on threat actors to help inform cloud customer security strategies in

React to this headline:

Loading spinner

Rise in cyberwarfare tactics fueled by geopolitical tensions Read More »

Businesses banning or limiting use of GenAI over privacy risks

Businesses banning or limiting use of GenAI over privacy risks 2024-02-05 at 07:01 By Help Net Security Privacy is much more than a regulatory compliance matter. Findings from a new Cisco study highlight the growing Privacy concerns with GenAI, trust challenges facing organizations over their use of AI, and the attractive returns from privacy investment.

React to this headline:

Loading spinner

Businesses banning or limiting use of GenAI over privacy risks Read More »

How to make developers accept DevSecOps

How to make developers accept DevSecOps 2024-01-31 at 07:05 By Helga Labus According to a recent Dynatrace report, only 50% of CISOs believe that development teams have thoroughly tested the software for vulnerabilities before deploying it into the production environment. This is a statistic that needs to change and the only way to change it

React to this headline:

Loading spinner

How to make developers accept DevSecOps Read More »

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity 2024-01-29 at 07:32 By Mirko Zorz In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous adaptation in cybersecurity strategies to practical advice

React to this headline:

Loading spinner

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity Read More »

CISOs’ role in identifying tech components and managing supply chains

CISOs’ role in identifying tech components and managing supply chains 2024-01-25 at 07:01 By Mirko Zorz In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains and achieving comprehensive visibility. Warfield also discusses the vital collaboration between security and

React to this headline:

Loading spinner

CISOs’ role in identifying tech components and managing supply chains Read More »

CISO Conversations: The Legal Sector With Alyssa Miller at Epiq and Mark Walmsley at Freshfields

CISO Conversations: The Legal Sector With Alyssa Miller at Epiq and Mark Walmsley at Freshfields 2024-01-24 at 17:48 By Kevin Townsend SecurityWeek talks to legal sector CISOs Alyssa Miller at Epiq and Mark Walmsley at Freshfields Bruckhaus Deringer The post CISO Conversations: The Legal Sector With Alyssa Miller at Epiq and Mark Walmsley at Freshfields

React to this headline:

Loading spinner

CISO Conversations: The Legal Sector With Alyssa Miller at Epiq and Mark Walmsley at Freshfields Read More »

Prioritizing CIS Controls for effective cybersecurity across organizations

Prioritizing CIS Controls for effective cybersecurity across organizations 2024-01-24 at 07:32 By Mirko Zorz In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations of varying sizes. Marchany explores the importance of securing top-level management support, breaking down data silos, and

React to this headline:

Loading spinner

Prioritizing CIS Controls for effective cybersecurity across organizations Read More »

CISOs’ crucial role in aligning security goals with enterprise expectations

CISOs’ crucial role in aligning security goals with enterprise expectations 2024-01-17 at 07:01 By Mirko Zorz In this Help Net Security interview, Chris Mixter, Vice President, Analyst at Gartner, discusses the dynamic world of CISOs and how their roles have evolved significantly over the years. He outlines the critical skills for CISOs in 2024, addresses

React to this headline:

Loading spinner

CISOs’ crucial role in aligning security goals with enterprise expectations Read More »

10 cybersecurity frameworks you need to know about

10 cybersecurity frameworks you need to know about 2024-01-16 at 07:01 By Help Net Security As cyber threats grow more sophisticated, understanding and implementing robust cybersecurity frameworks is crucial for organizations of all sizes. This article lists the most essential cybersecurity frameworks developed to guide businesses and governments in safeguarding their digital assets. From the

React to this headline:

Loading spinner

10 cybersecurity frameworks you need to know about Read More »

Flipping the BEC funnel: Phishing in the age of GenAI

Flipping the BEC funnel: Phishing in the age of GenAI 2024-01-15 at 08:02 By Help Net Security For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written) email and fire it out to thousands of recipients in the hope that a few might take the

React to this headline:

Loading spinner

Flipping the BEC funnel: Phishing in the age of GenAI Read More »

Key elements for a successful cyber risk management strategy

Key elements for a successful cyber risk management strategy 2024-01-15 at 06:32 By Mirko Zorz In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel anticipates a growing pressure on organizations

React to this headline:

Loading spinner

Key elements for a successful cyber risk management strategy Read More »

Scroll to Top