cyber risk

Building a cybersecurity strategy that survives disruption

Building a cybersecurity strategy that survives disruption 2025-04-03 at 08:14 By Mirko Zorz Cybersecurity isn’t what it used to be. Attackers are moving quicker, disruptions happen all the time, and many security plans built for more predictable times just can’t keep up. With everything from ransomware to geopolitical threats to cloud slip-ups hitting companies, there’s […]

React to this headline:

Loading spinner

Building a cybersecurity strategy that survives disruption Read More »

Why global tensions are a cybersecurity problem for every business

Why global tensions are a cybersecurity problem for every business 2025-04-01 at 09:03 By Mirko Zorz With global tensions climbing, cyber attacks linked to nation-states and their allies are becoming more common, sophisticated, and destructive. For organizations, cybersecurity can’t be treated as separate from world events anymore, they’re closely connected. Conflict between countries is spilling

React to this headline:

Loading spinner

Why global tensions are a cybersecurity problem for every business Read More »

GenAI turning employees into unintentional insider threats

GenAI turning employees into unintentional insider threats 2025-03-31 at 07:03 By Help Net Security The amount of data being shared by businesses with GenAI apps has exploded, increasing 30x in one year, according to Netskope. The average organization now shares more than 7.7GB of data with AI tools per month, a massive jump from just

React to this headline:

Loading spinner

GenAI turning employees into unintentional insider threats Read More »

Cyber insurance isn’t always what it seems

Cyber insurance isn’t always what it seems 2025-03-27 at 07:39 By Mirko Zorz Many companies think cyber insurance will protect them from financial losses after an attack. But many policies have gaps. Some claims get denied. Others cover less than expected. CISOs must understand the risks before an attack happens. Misconceptions about cyber insurance Myth:

React to this headline:

Loading spinner

Cyber insurance isn’t always what it seems Read More »

How healthcare CISOs can balance security and accessibility without compromising care

How healthcare CISOs can balance security and accessibility without compromising care 2025-03-20 at 08:35 By Mirko Zorz In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. He shares insights on vendor management, zero trust, and

React to this headline:

Loading spinner

How healthcare CISOs can balance security and accessibility without compromising care Read More »

Quantifying cyber risk strategies to resonate with CFOs and boards

Quantifying cyber risk strategies to resonate with CFOs and boards 2025-03-14 at 17:02 By Mirko Zorz In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning cybersecurity

React to this headline:

Loading spinner

Quantifying cyber risk strategies to resonate with CFOs and boards Read More »

94% of Wi-Fi networks lack protection against deauthentication attacks

94% of Wi-Fi networks lack protection against deauthentication attacks 2025-03-14 at 07:34 By Help Net Security A recent report from Nozomi Networks Labs, based on an analysis of over 500,000 wireless networks worldwide, reveals that only 6% are adequately protected against wireless deauthentication attacks. Most wireless networks, including those in mission-critical environments, remain highly exposed

React to this headline:

Loading spinner

94% of Wi-Fi networks lack protection against deauthentication attacks Read More »

CISOs, are your medical devices secure? Attackers are watching closely

CISOs, are your medical devices secure? Attackers are watching closely 2025-03-13 at 08:02 By Mirko Zorz The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced cybersecurity challenges to safeguard patient safety and uphold organizational security. Securing IoMT: Prioritizing risks

React to this headline:

Loading spinner

CISOs, are your medical devices secure? Attackers are watching closely Read More »

Innovation vs. security: Managing shadow AI risks

Innovation vs. security: Managing shadow AI risks 2025-03-03 at 18:02 By Help Net Security In this Help Net Security video, Tim Morris, Chief Security Advisor at Tanium, shares practical best practices to help organizations balance innovation and security while leveraging AI. Morris warns of an even riskier shadow AI trend in which departments, unsatisfied with

React to this headline:

Loading spinner

Innovation vs. security: Managing shadow AI risks Read More »

The CISO’s dilemma of protecting the enterprise while driving innovation

The CISO’s dilemma of protecting the enterprise while driving innovation 2025-02-25 at 07:34 By Help Net Security CISOs are constantly navigating the challenge of protecting their organizations while ensuring business agility and innovation. For example, as companies move workloads to the cloud to support remote teams, security teams must secure data without slowing down productivity.

React to this headline:

Loading spinner

The CISO’s dilemma of protecting the enterprise while driving innovation Read More »

New GRC and cyber risk strategies emphasize risk adaptability

New GRC and cyber risk strategies emphasize risk adaptability 2025-02-14 at 18:04 By Help Net Security MetricStream has unveiled its annual forecast of key trends shaping the future of GRC and Cyber GRC. These 2025 predictions offer a roadmap for building resilience strategies, addressing emerging risks, and seizing new opportunities. AI comes of age: risks,

React to this headline:

Loading spinner

New GRC and cyber risk strategies emphasize risk adaptability Read More »

Cyber trends set to influence business strategies

Cyber trends set to influence business strategies 2025-01-27 at 06:42 By Help Net Security Diligent convened a group of 65 board members, C-suite executives, and leading subject matter experts to explore topics shaping the future of business: generative AI, cybersecurity and data privacy, geopolitical risk, and financial fraud and abuse. In this Help Net Security

React to this headline:

Loading spinner

Cyber trends set to influence business strategies Read More »

Making the most of cryptography, now and in the future

Making the most of cryptography, now and in the future 2025-01-07 at 08:03 By Help Net Security Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. Though we believe that it is “unlikely” they can be, the reality is

React to this headline:

Loading spinner

Making the most of cryptography, now and in the future Read More »

Why software is the key to FI risk management

Why software is the key to FI risk management 2024-12-31 at 07:33 By Help Net Security Risk management is important, but it’s not always exciting. Many risk professionals still rely on spreadsheets and manual methods despite the availability of better options. Excel is familiar and cost-effective. Some spreadsheets are handy for certain risk management activities.

React to this headline:

Loading spinner

Why software is the key to FI risk management Read More »

Machine identities are the next big target for attackers

Machine identities are the next big target for attackers 2024-12-30 at 06:34 By Help Net Security 86% of organizations had a security incident related to their cloud native environment within the last year, according to Venafi. As a result, 53% of organizations had to delay an application launch or slow down production time; 45% suffered

React to this headline:

Loading spinner

Machine identities are the next big target for attackers Read More »

API security blind spots put businesses at risk

API security blind spots put businesses at risk 2024-12-24 at 06:03 By Help Net Security Many customer-facing APIs remain unprotected, leaving businesses vulnerable to breaches. To address these threats, a comprehensive approach to API security, covering every stage of the lifecycle, is essential to protect sensitive data and prevent exploitation. In this article, you will

React to this headline:

Loading spinner

API security blind spots put businesses at risk Read More »

46% of financial institutions had a data breach in the past 24 months

46% of financial institutions had a data breach in the past 24 months 2024-12-20 at 06:34 By Help Net Security As the financial industry is the most targeted sector for data breaches in 2024, it’s now more important than ever to strengthen the industry moving into 2025, according to SailPoint. Financial institutions face growing cyber

React to this headline:

Loading spinner

46% of financial institutions had a data breach in the past 24 months Read More »

Overlooking platform security weakens long-term cybersecurity posture

Overlooking platform security weakens long-term cybersecurity posture 2024-12-16 at 06:04 By Help Net Security Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. The report, based on a global study of 800+ IT and security decision-makers (ITSDMs)

React to this headline:

Loading spinner

Overlooking platform security weakens long-term cybersecurity posture Read More »

70% of open-source components are poorly or no longer maintained

70% of open-source components are poorly or no longer maintained 2024-12-04 at 06:35 By Help Net Security The geographic distribution of open-source contributions introduces geopolitical risks that organizations must urgently consider, especially with rising nation-state attacks, according to Lineaje. Open-source code risks rise with anonymous contributions Microsoft estimates that its customers face 600 million cyberattacks

React to this headline:

Loading spinner

70% of open-source components are poorly or no longer maintained Read More »

65% of office workers bypass cybersecurity to boost productivity

65% of office workers bypass cybersecurity to boost productivity 2024-12-04 at 06:04 By Help Net Security High-risk access exists throughout the workplace, in almost every job role, proving that the time has come for organizations to re-think the way they protect their workforce, according to CyberArk. CyberArk surveyed 14,003 employees in the UK, USA, France,

React to this headline:

Loading spinner

65% of office workers bypass cybersecurity to boost productivity Read More »

Scroll to Top