cyber risk

Third-party vendors pose serious cybersecurity threat to national security

Third-party vendors pose serious cybersecurity threat to national security 2024-06-04 at 07:01 By Help Net Security In this Help Net Security video, Paul Prudhomme, Principal Security Analyst at SecurityScorecard, discusses the findings of the 2024 Redefining Resilience: Concentrated Cyber Risk in a Global Economy Research report. This research details a surge in adversaries exploiting third-party […]

React to this headline:

Loading spinner

Third-party vendors pose serious cybersecurity threat to national security Read More »

Worried about job security, cyber teams hide security incidents

Worried about job security, cyber teams hide security incidents 2024-05-24 at 07:01 By Help Net Security The frequency and severity of cyberattacks are increasing—yet most businesses remain unprepared, according to VikingCloud. Between a growing talent shortage, alert fatigue, and new sophisticated attack methods, companies are more susceptible than ever. The research reveals that 40% of

React to this headline:

Loading spinner

Worried about job security, cyber teams hide security incidents Read More »

Technological complexity drives new wave of identity risks

Technological complexity drives new wave of identity risks 2024-05-22 at 06:01 By Help Net Security Security leaders are facing increased technological and organizational complexity, which is creating a new wave of identity risks for their organizations, according to ConductorOne. Based on a survey of 523 US-based IT security leaders at companies with 250 to 10,000

React to this headline:

Loading spinner

Technological complexity drives new wave of identity risks Read More »

Understanding cyber risks beyond data breaches

Understanding cyber risks beyond data breaches 2024-05-20 at 06:01 By Help Net Security While some may associate cyber risks primarily with technology and data breaches, they can also lead to brand or reputational harm, reduced productivity, and financial losses. This Help Net Security round-up presents excerpts from previously recorded videos featuring security experts covering a

React to this headline:

Loading spinner

Understanding cyber risks beyond data breaches Read More »

51% of enterprises experienced a breach despite large security stacks

51% of enterprises experienced a breach despite large security stacks 2024-04-19 at 06:31 By Help Net Security Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, according

React to this headline:

Loading spinner

51% of enterprises experienced a breach despite large security stacks Read More »

73% brace for cybersecurity impact on business in the next year or two

73% brace for cybersecurity impact on business in the next year or two 2024-04-02 at 06:31 By Help Net Security Only 3% of organizations across the globe have the ‘mature’ level of readiness needed to be resilient against modern cybersecurity risks, according to Cisco. The 2024 Cisco Cybersecurity Readiness Index highlights that readiness is down

React to this headline:

Loading spinner

73% brace for cybersecurity impact on business in the next year or two Read More »

Advanced cybersecurity strategies boost shareholder returns

Advanced cybersecurity strategies boost shareholder returns 2024-03-29 at 07:01 By Help Net Security Companies demonstrating advanced cybersecurity performance generate a shareholder return that is 372% higher than their peers with basic cybersecurity performance, according to a new report from Diligent and Bitsight. Boards under pressure to fortify cyber oversight The escalation in the frequency and

React to this headline:

Loading spinner

Advanced cybersecurity strategies boost shareholder returns Read More »

Immediate AI risks and tomorrow’s dangers

Immediate AI risks and tomorrow’s dangers 2024-03-08 at 08:37 By Helga Labus “At the most basic level, AI has given malicious attackers superpowers,” Mackenzie Jackson, developer and security advocate at GitGuardian, told the audience last week at Bsides Zagreb. These superpowers are most evident in the growing impact of fishing, smishing and vishing attacks since

React to this headline:

Loading spinner

Immediate AI risks and tomorrow’s dangers Read More »

The importance of a good API security strategy

The importance of a good API security strategy 2024-02-21 at 06:32 By Helga Labus In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API Security & Management Report, confirming that APIs are a crucial component of modern software development. But with their increased adoption over

React to this headline:

Loading spinner

The importance of a good API security strategy Read More »

Common cloud security mistakes and how to avoid them

Common cloud security mistakes and how to avoid them 2024-02-07 at 08:01 By Helga Labus According to recent surveys, 98% of organizations keep their financial, business, customer and/or employee information in the cloud but, at the same time, 95% of cloud security professionals are not sure their security protections and their team would manage to

React to this headline:

Loading spinner

Common cloud security mistakes and how to avoid them Read More »

Third-party risk management best practices and why they matter

Third-party risk management best practices and why they matter 2024-01-29 at 08:01 By Helga Labus With organizations increasingly relying on third-party vendors, upping the third-party risk management (TPRM) game has become imperative to prevent the fallout of third-party compromises. Third-party risks SecurityScorecard recently found that 98% of organizations are connected with at least one third-party

React to this headline:

Loading spinner

Third-party risk management best practices and why they matter Read More »

Fighting insider threats is tricky but essential work

Fighting insider threats is tricky but essential work 2024-01-25 at 08:01 By Helga Labus Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats (75%). But which of the two is a bigger threat to a company? External vs insider threats External threats can cause

React to this headline:

Loading spinner

Fighting insider threats is tricky but essential work Read More »

2024 brings new risks, with cyber incidents in the spotlight

2024 brings new risks, with cyber incidents in the spotlight 2024-01-23 at 06:31 By Help Net Security Cyber incidents such as ransomware attacks, data breaches, and IT disruptions are the biggest worry for companies globally in 2024, according to Allianz. The closely interlinked peril of business interruption ranks second. Natural catastrophes (up from #6 to

React to this headline:

Loading spinner

2024 brings new risks, with cyber incidents in the spotlight Read More »

The reality of hacking threats in connected car systems

The reality of hacking threats in connected car systems 2024-01-22 at 07:31 By Mirko Zorz With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity challenges, ranging from hacking and

React to this headline:

Loading spinner

The reality of hacking threats in connected car systems Read More »

The power of AI in cybersecurity

The power of AI in cybersecurity 2024-01-18 at 06:31 By Helga Labus The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber threat landscape and cybersecurity. AI as a powerful cybersecurity tool As organizations handle increasing amounts of data daily, AI offers advanced capabilities that

React to this headline:

Loading spinner

The power of AI in cybersecurity Read More »

Key elements for a successful cyber risk management strategy

Key elements for a successful cyber risk management strategy 2024-01-15 at 06:32 By Mirko Zorz In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel anticipates a growing pressure on organizations

React to this headline:

Loading spinner

Key elements for a successful cyber risk management strategy Read More »

The growing challenge of cyber risk in the age of synthetic media

The growing challenge of cyber risk in the age of synthetic media 2024-01-09 at 07:01 By Help Net Security As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. In this Help Net Security video, Mike Bechtel, Chief Futurist at Deloitte, discusses

React to this headline:

Loading spinner

The growing challenge of cyber risk in the age of synthetic media Read More »

Review: Engineering-grade OT security: A manager’s guide

Review: Engineering-grade OT security: A manager’s guide 2024-01-08 at 08:01 By Helga Labus Andrew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer Science from the University of Calgary. He developed control system software products for Hewlett

React to this headline:

Loading spinner

Review: Engineering-grade OT security: A manager’s guide Read More »

Which cybersecurity controls are organizations struggling with?

Which cybersecurity controls are organizations struggling with? 13/12/2023 at 13:02 By Help Net Security How are organizations performing across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework? A recent analysis by Bitsight and Google reveals some good and some bad results – and room for improvement. What is MVSP? Minimum Viable Secure Product

React to this headline:

Loading spinner

Which cybersecurity controls are organizations struggling with? Read More »

CISA offers cybersecurity services to non-federal orgs in critical infrastructure sector

CISA offers cybersecurity services to non-federal orgs in critical infrastructure sector 22/11/2023 at 12:47 By Helga Labus The Cybersecurity and Infrastructure Security Agency (CISA) has announced a pilot program that aims to offer cybersecurity services to critical infrastructure entities as they have become a common target in cyberattacks. “In alignment with CISA’s ‘Target Rich, Resource

React to this headline:

Loading spinner

CISA offers cybersecurity services to non-federal orgs in critical infrastructure sector Read More »

Scroll to Top