cybersecurity

Strategies to cultivate collaboration between NetOps and SecOps

Strategies to cultivate collaboration between NetOps and SecOps 2024-04-12 at 07:31 By Mirko Zorz In this Help Net Security interview, Debby Briggs, CISO at Netscout, discusses breaking down silos between NetOps and SecOps. Practical steps include scheduling strategy meetings, understanding communication preferences, and fostering team collaboration. With evolving cloud models, collaboration and clear role assignments …

Strategies to cultivate collaboration between NetOps and SecOps Read More »

React to this headline:

Loading spinner

The next wave of mobile threats

The next wave of mobile threats 2024-04-12 at 07:01 By Help Net Security According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security software market to grow by $2.75 billion between 2020 and 2025, expanding at a CAGR of 9.68%. In …

The next wave of mobile threats Read More »

React to this headline:

Loading spinner

Why women struggle in the cybersecurity industry

Why women struggle in the cybersecurity industry 2024-04-12 at 06:31 By Help Net Security The workplace experiences of women in cybersecurity are dramatically worse than men across virtually every category, according to a WiCyS and Aleria survey. Previous studies have illustrated that the representation of women in cybersecurity is much lower than it should be, …

Why women struggle in the cybersecurity industry Read More »

React to this headline:

Loading spinner

How Google’s 90-day TLS certificate validity proposal will affect enterprises

How Google’s 90-day TLS certificate validity proposal will affect enterprises 2024-04-11 at 08:01 By Help Net Security Announced last year, Google’s proposal to reduce the lifespan of TLS (transport layer security) certificates from 13 months to 90 days could be implemented in the near future. It will certainly improve security and shrink the window of …

How Google’s 90-day TLS certificate validity proposal will affect enterprises Read More »

React to this headline:

Loading spinner

Leveraging AI for enhanced compliance and governance

Leveraging AI for enhanced compliance and governance 2024-04-11 at 07:31 By Mirko Zorz In this Help Net Security interview, Dr. Joseph Sweeney, Advisor at IBRS, discusses the risks of integrating AI into information management systems. He talks about emerging trends such as content cognition. He predicts advancements in AI-driven information management tools, as well as …

Leveraging AI for enhanced compliance and governance Read More »

React to this headline:

Loading spinner

37% of publicly shared files expose personal information

37% of publicly shared files expose personal information 2024-04-11 at 06:31 By Help Net Security Many sensitive documents stored on platforms such as Google Drive, Slack, and other collaborative work applications have been left unattended for several months or even years. This has led to data sprawl challenges for companies and significant data security threats …

37% of publicly shared files expose personal information Read More »

React to this headline:

Loading spinner

Stopping security breaches by managing AppSec posture

Stopping security breaches by managing AppSec posture 2024-04-11 at 06:01 By Help Net Security Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software development life cycle, from code to cloud. In this Help Net Security video, …

Stopping security breaches by managing AppSec posture Read More »

React to this headline:

Loading spinner

Upcoming report on the state of cybersecurity in Croatia

Upcoming report on the state of cybersecurity in Croatia 2024-04-10 at 09:46 By Industry News Next week, Diverto is set to release a comprehensive report on Croatia’s cybersecurity landscape. This report will provide a detailed summary of the key events from 2023, offer targeted recommendations for managerial strategies, and highlight crucial regulations like NIS2 and …

Upcoming report on the state of cybersecurity in Croatia Read More »

React to this headline:

Loading spinner

Why are many businesses turning to third-party security partners?

Why are many businesses turning to third-party security partners? 2024-04-10 at 08:03 By Help Net Security In 2023, 71% of organizations across various industries reported that their business feels the impact of the ongoing cybersecurity skills shortage. Many companies have been forced to scale back their cybersecurity programs as they struggle to find experienced candidates …

Why are many businesses turning to third-party security partners? Read More »

React to this headline:

Loading spinner

AI risks under the auditor’s lens more than ever

AI risks under the auditor’s lens more than ever 2024-04-10 at 07:01 By Help Net Security According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s use. In this Help Net Security video, Thomas Teravainen, a Research Specialist at Gartner, …

AI risks under the auditor’s lens more than ever Read More »

React to this headline:

Loading spinner

How exposure management elevates cyber resilience

How exposure management elevates cyber resilience 2024-04-09 at 07:46 By Help Net Security Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset identification and understand their assets’ security posture in relation to the whole estate. Instead of asking, “Are we exposed?” organizations …

How exposure management elevates cyber resilience Read More »

React to this headline:

Loading spinner

Defining a holistic GRC strategy

Defining a holistic GRC strategy 2024-04-09 at 06:31 By Help Net Security End-user spending on security and risk management will total $215 billion in 2024, according to Gartner. In this Help Net Security video, Nicholas Kathmann, CISO at LogicGate, discusses why companies are turning to a holistic GRC strategy. Businesses often consider GRC a “necessary …

Defining a holistic GRC strategy Read More »

React to this headline:

Loading spinner

How can the energy sector bolster its resilience to ransomware attacks?

How can the energy sector bolster its resilience to ransomware attacks? 2024-04-08 at 08:01 By Help Net Security Since it plays a vital role in every functioning society, the energy sector has always been a prime target for state-backed cybercriminals. The cyber threats targeting this industry have grown significantly in recent years, as geopolitical tensions …

How can the energy sector bolster its resilience to ransomware attacks? Read More »

React to this headline:

Loading spinner

How malicious email campaigns continue to slip through the cracks

How malicious email campaigns continue to slip through the cracks 2024-04-08 at 07:01 By Help Net Security In this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form of communication within a business. Cofense researchers have …

How malicious email campaigns continue to slip through the cracks Read More »

React to this headline:

Loading spinner

Industrial sectors embrace zero trust for enhanced security

Industrial sectors embrace zero trust for enhanced security 2024-04-08 at 06:32 By Help Net Security Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments, according to Xage Security. Zero trust security implementation in industrial sectors The report analyzes the current status and trajectory of …

Industrial sectors embrace zero trust for enhanced security Read More »

React to this headline:

Loading spinner

Threat actors are raising the bar for cyber attacks

Threat actors are raising the bar for cyber attacks 2024-04-08 at 06:02 By Help Net Security From sophisticated nation-state-sponsored intrusions to opportunistic malware campaigns, cyber attacks manifest in various forms, targeting vulnerabilities in networks, applications, and user behavior. The consequences of successful cyber attacks can be severe, ranging from financial losses and reputational damage to …

Threat actors are raising the bar for cyber attacks Read More »

React to this headline:

Loading spinner

Securing your crypto funds: Exchanges add support for hardware 2FA

Securing your crypto funds: Exchanges add support for hardware 2FA 2024-04-05 at 17:02 By Cointelegraph by Rachel Wolfson As phishing attacks rise, crypto exchanges tell users to keep their funds safe by using YubiKey devices and Passkeys, along with hardware wallets. This article is an excerpt from Cointelegraph.com News View Original Source React to this …

Securing your crypto funds: Exchanges add support for hardware 2FA Read More »

React to this headline:

Loading spinner

Cybercriminal adoption of browser fingerprinting

Cybercriminal adoption of browser fingerprinting 2024-04-05 at 08:01 By Help Net Security Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now …

Cybercriminal adoption of browser fingerprinting Read More »

React to this headline:

Loading spinner

Security pros are cautiously optimistic about AI

Security pros are cautiously optimistic about AI 2024-04-05 at 07:32 By Help Net Security 55% of organizations plan to adopt GenAI solutions within this year, signaling a substantial surge in GenAI integration, according to a Cloud Security Alliance and Google Cloud survey. The survey received 2,486 responses from IT and security professionals. The report indicates …

Security pros are cautiously optimistic about AI Read More »

React to this headline:

Loading spinner

22% of employees admit to breaching company rules with GenAI

22% of employees admit to breaching company rules with GenAI 2024-04-05 at 07:02 By Help Net Security Disruptive technologies like AI are heightening the longstanding tension between organizational security and employee productivity, according to 1Password. Employees are under increasing pressure to perform; to boost efficiency they’re embracing generative AI, hybrid and remote work, and unapproved …

22% of employees admit to breaching company rules with GenAI Read More »

React to this headline:

Loading spinner
Scroll to Top