cybersecurity

Increased spending doesn’t translate to improved cybersecurity posture

Increased spending doesn’t translate to improved cybersecurity posture 22/06/2023 at 06:21 By Help Net Security Security teams are stretched, with not enough people, skills or budget to cope with all their priorities, according to Panaseer. Average cybersecurity budgets increase in 2023 The survey of over 400 cybersecurity decision makers and practitioners across the US and […]

React to this headline:

Loading spinner

Increased spending doesn’t translate to improved cybersecurity posture Read More »

How to create SBOMs for container images

How to create SBOMs for container images 21/06/2023 at 09:06 By Help Net Security The importance of software bills of materials (SBOMs) has grown substantially in recent years as organizations recognize the need for greater transparency in the software supply chain. This focus on SBOMs is a response to increasing cybersecurity threats and legislative efforts

React to this headline:

Loading spinner

How to create SBOMs for container images Read More »

Empowering Google security and networking solutions with AI

Empowering Google security and networking solutions with AI 21/06/2023 at 06:47 By Mirko Zorz In this Help Net Security interview, Sunil Potti, VP and GM, Cloud Security Google Cloud, talks about how new security and networking solutions powered by AI help improve security so Google customers can address their most pressing security challenges and remain

React to this headline:

Loading spinner

Empowering Google security and networking solutions with AI Read More »

The significance of CIS Control mapping in the 2023 Verizon DBIR

The significance of CIS Control mapping in the 2023 Verizon DBIR 20/06/2023 at 07:48 By Help Net Security Verizon’s recently released 2023 Data Breach Investigation Report (DBIR) provides organizations with a comprehensive analysis of the evolving threat landscape and valuable insights into incident types and vulnerabilities. This year, the report includes the mapping of CIS

React to this headline:

Loading spinner

The significance of CIS Control mapping in the 2023 Verizon DBIR Read More »

10 open-source recon tools worth your time

10 open-source recon tools worth your time 20/06/2023 at 07:02 By Help Net Security Recon is the initial stage in the penetration testing process. It’s a vital phase allowing the tester to understand their target and strategize their moves. Here are ten open-source recon tools that deserve to be in your arsenal. Altdns Altdns is

React to this headline:

Loading spinner

10 open-source recon tools worth your time Read More »

Goodbyes are difficult, IT offboarding processes make them harder

Goodbyes are difficult, IT offboarding processes make them harder 19/06/2023 at 07:32 By Help Net Security When employees, contractors and service providers leave an organization, they take with them knowledge, capabilities, and professional achievements. They should leave behind any proprietary or confidential data belonging to the organization, but Osterman Research found that 69% of organizations

React to this headline:

Loading spinner

Goodbyes are difficult, IT offboarding processes make them harder Read More »

How to simplify the process of compliance with U.S. Executive Order 14028

How to simplify the process of compliance with U.S. Executive Order 14028 19/06/2023 at 07:03 By Help Net Security In this Help Net Security video, Nick Mistry, SVP and CISO at Lineaje, offers tips to simplify the process of compliance with U.S. Executive Order 14028. A key part of U.S. Executive Order 14028 is for

React to this headline:

Loading spinner

How to simplify the process of compliance with U.S. Executive Order 14028 Read More »

Three cybersecurity actions that make a difference

Three cybersecurity actions that make a difference 19/06/2023 at 06:02 By Help Net Security Organizations that closely align their cybersecurity programs to business objectives are 18% more likely to achieve target revenue growth and market share and improve customer satisfaction, as well as 26% more likely to lower the cost of cybersecurity breaches/incidents, on average,

React to this headline:

Loading spinner

Three cybersecurity actions that make a difference Read More »

Red teaming can be the ground truth for CISOs and execs

Red teaming can be the ground truth for CISOs and execs 16/06/2023 at 08:03 By Help Net Security This year, against the backdrop of attacks on everyone from healthcare institutions and schools to financial services organizations, as well as the introduction of legislation across the UK and EU to move security up the agenda, cybersecurity

React to this headline:

Loading spinner

Red teaming can be the ground truth for CISOs and execs Read More »

Cybercriminals return to business as usual in a post-pandemic world

Cybercriminals return to business as usual in a post-pandemic world 16/06/2023 at 06:31 By Help Net Security After two years of pandemic-induced disruption, 2022 was a return to business as usual for the world’s cybercriminals, according to Proofpoint. As COVID-19 medical and economic programs began to wind down, attackers had to find new ways to

React to this headline:

Loading spinner

Cybercriminals return to business as usual in a post-pandemic world Read More »

Cybersecurity culture improves despite the dark clouds of the past year

Cybersecurity culture improves despite the dark clouds of the past year 16/06/2023 at 06:00 By Help Net Security Despite a hardening economic climate, heightened global tensions and the onset of new technology making cybercrime easier, 76% of the CISOs, suggested that no material breaches had occurred and 60% said that no material cybersecurity incident had

React to this headline:

Loading spinner

Cybersecurity culture improves despite the dark clouds of the past year Read More »

How secure is your vehicle with digital key technology?

How secure is your vehicle with digital key technology? 15/06/2023 at 08:22 By Help Net Security Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the automotive industry. While there are a few different approaches to implementing digital keys for automotive use, a secure digital

React to this headline:

Loading spinner

How secure is your vehicle with digital key technology? Read More »

How cybercriminals target energy companies

How cybercriminals target energy companies 15/06/2023 at 07:34 By Help Net Security In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses how cybercriminals employ specialized strategies when targeting energy companies. This is primarily due to the sensitive and valuable information these organizations hold and their critical role in

React to this headline:

Loading spinner

How cybercriminals target energy companies Read More »

Cyber debt levels reach tipping point

Cyber debt levels reach tipping point 15/06/2023 at 06:35 By Help Net Security The tension between difficult economic conditions and the pace of technology innovation, including the evolution of AI, is influencing the growth of identity-led cybersecurity exposure, according to CyberArk. The CyberArk’s report details how these issues – allied to an expected 240% growth

React to this headline:

Loading spinner

Cyber debt levels reach tipping point Read More »

Small organizations outpace large enterprises in MFA adoption

Small organizations outpace large enterprises in MFA adoption 15/06/2023 at 06:04 By Help Net Security The use of MFA has nearly doubled since 2020 and that phishing-resistant authenticators represent the best choice in terms of security and convenience for users, according to Okta. MFA authentication gains traction MFA authentication has steadily gained traction across organizations

React to this headline:

Loading spinner

Small organizations outpace large enterprises in MFA adoption Read More »

Enhancing security team capabilities in tough economic times

Enhancing security team capabilities in tough economic times 14/06/2023 at 07:02 By Help Net Security According to ESG, 70% of cybersecurity pros expect budget cuts or freezes this year, which, in turn, will trigger project delays and greater vendor scrutiny. Understaffing and low budgets are ever-present challenges, but security teams are uniquely affected by alert

React to this headline:

Loading spinner

Enhancing security team capabilities in tough economic times Read More »

Ignoring digital transformation is more dangerous than a recession

Ignoring digital transformation is more dangerous than a recession 14/06/2023 at 07:02 By Help Net Security Business leaders worldwide understand they need to invest in digital transformation to meet a new innovation imperative, despite ongoing macroeconomic pressures and an increasingly uncertain, competitive business environment, according to Insight. The pandemic accelerated transformation in every industry as

React to this headline:

Loading spinner

Ignoring digital transformation is more dangerous than a recession Read More »

How to achieve cyber resilience?

How to achieve cyber resilience? 13/06/2023 at 07:32 By Help Net Security Cyber resilience is a leading strategic priority today, and most enterprises are now pursuing programs to bolster their ability to mitigate attacks. Yet despite the importance placed on cyber resilience, many organizations struggle to measure their capabilities or track their progress. They are

React to this headline:

Loading spinner

How to achieve cyber resilience? Read More »

Quantum computing’s threat to national security

Quantum computing’s threat to national security 13/06/2023 at 07:02 By Help Net Security In this Help Net Security video, Denis Mandich, CTO at Qrypt, talks about quantum computing. If we thought AI turned security and privacy on their head, quantum computing will break how we encrypt data today and risk revealing sensitive data of citizens,

React to this headline:

Loading spinner

Quantum computing’s threat to national security Read More »

Building a culture of security awareness in healthcare begins with leadership

Building a culture of security awareness in healthcare begins with leadership 12/06/2023 at 07:35 By Mirko Zorz With the rise of modern trends such as cloud computing and remote work, healthcare institutions strive to balance accessibility, convenience, and robust security. In this Help Net Security interview, Ken Briggs, General Counsel at Salucro, discusses how fostering

React to this headline:

Loading spinner

Building a culture of security awareness in healthcare begins with leadership Read More »

Scroll to Top