Expert corner

For TSA’s updated Pipeline Security Directive, consistency and collaboration are key

For TSA’s updated Pipeline Security Directive, consistency and collaboration are key 08/08/2023 at 08:03 By Help Net Security Late last month, the Transportation Security Administration renewed and updated its security directive aimed at enhancing the cybersecurity of oil and natural gas pipelines. The reissued guidance, known as Security Directive (SD) Pipeline-2021-02D Pipeline Cybersecurity Mitigation, Actions, […]

React to this headline:

Loading spinner

For TSA’s updated Pipeline Security Directive, consistency and collaboration are key Read More »

Multi-modal data protection with AI’s help

Multi-modal data protection with AI’s help 04/08/2023 at 08:02 By Help Net Security Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must deal with first order chaos and risk much like hurricanes in meteorology or viruses in biology: complex and dangerous – but fundamentally

React to this headline:

Loading spinner

Multi-modal data protection with AI’s help Read More »

Keeping the cloud secure with a mindset shift

Keeping the cloud secure with a mindset shift 01/08/2023 at 08:02 By Help Net Security Gartner estimates that in 2023 worldwide end-user spending on public cloud services will grow by 21.7% and hit nearly $600 billion. Even as the economic downturn has most businesses looking for ways to tighten their belts, the cloud remains one

React to this headline:

Loading spinner

Keeping the cloud secure with a mindset shift Read More »

How the best CISOs leverage people and technology to become superstars

How the best CISOs leverage people and technology to become superstars 31/07/2023 at 07:47 By Help Net Security What separates superstar CISOs from the rest of the pack is that they are keenly aware of the burgeoning threat landscape and the cybersecurity skills shortage, but they don’t give in to despair. Instead, they use their

React to this headline:

Loading spinner

How the best CISOs leverage people and technology to become superstars Read More »

ZTNA can be more than a VPN replacement for application access

ZTNA can be more than a VPN replacement for application access 28/07/2023 at 07:47 By Help Net Security In the wake of increased workforce mobility, today’s organizations require more innovative, more flexible, and more secure methods of granting network and application access to their workers. ZTNA adoption The encryption-based security approach leveraged by the virtual

React to this headline:

Loading spinner

ZTNA can be more than a VPN replacement for application access Read More »

A step-by-step guide for patching software vulnerabilities

A step-by-step guide for patching software vulnerabilities 27/07/2023 at 07:34 By Help Net Security Coalition’s recent Cyber Threat Index 2023 predicts the average Common Vulnerabilities and Exposures (CVEs) rate will rise by 13% over 2022 to more than 1,900 per month in 2023. As thousands of patches and updates are released each month, organizations struggle

React to this headline:

Loading spinner

A step-by-step guide for patching software vulnerabilities Read More »

Why data travel is healthcare’s next big cybersecurity challenge

Why data travel is healthcare’s next big cybersecurity challenge 20/07/2023 at 08:02 By Help Net Security Do you know where your patients’ data lives once it’s in the cloud? Unfortunately, for many healthcare organizations, the answer is no – or, at least, it’s not a definitive yes. Knowing how (or where) data is used, shared

React to this headline:

Loading spinner

Why data travel is healthcare’s next big cybersecurity challenge Read More »

Trends in ransomware-as-a-service and cryptocurrency to monitor

Trends in ransomware-as-a-service and cryptocurrency to monitor 19/07/2023 at 08:02 By Help Net Security In January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business model. Hive is widely believed to be affiliated with the Conti ransomware group, joining a list of other groups associated with

React to this headline:

Loading spinner

Trends in ransomware-as-a-service and cryptocurrency to monitor Read More »

Combatting data governance risks of public generative AI tools

Combatting data governance risks of public generative AI tools 13/07/2023 at 08:02 By Help Net Security When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or the accidental exposure of proprietary information can lead to reputational damage, legal

React to this headline:

Loading spinner

Combatting data governance risks of public generative AI tools Read More »

Staying ahead of the “professionals”: The service-oriented ransomware crime industry

Staying ahead of the “professionals”: The service-oriented ransomware crime industry 12/07/2023 at 07:35 By Help Net Security Ransomware has been a hugely profitable industry for criminal gangs for the last few years. The total amount of ransom paid since 2020 is estimated to be at least $2 billion, and this has both motivated and enabled

React to this headline:

Loading spinner

Staying ahead of the “professionals”: The service-oriented ransomware crime industry Read More »

How to cultivate a culture of continuous cybersecurity improvement

How to cultivate a culture of continuous cybersecurity improvement 06/07/2023 at 07:32 By Help Net Security Regulatory compliance and cybersecurity improvement are not two sides of the same coin: they are distinct pillars that demand specialized attention. Achieving compliance does not create an impenetrable fortress against threats, it merely creates a baseline defense. So, how

React to this headline:

Loading spinner

How to cultivate a culture of continuous cybersecurity improvement Read More »

Operationalizing zero trust in the cloud

Operationalizing zero trust in the cloud 23/06/2023 at 07:39 By Help Net Security Some organizations have bought into the idea that workloads in the cloud are inherently more secure than those on premises. This idea is reinforced by the concept that the cloud service provider (CSP) assumes responsibility for security. However, while a secure cloud

React to this headline:

Loading spinner

Operationalizing zero trust in the cloud Read More »

Cloud-native security hinges on open source

Cloud-native security hinges on open source 22/06/2023 at 07:33 By Help Net Security Technologies like Kubernetes and K3S are synonymous with the success of cloud native computing and the power of open source. It is no accident they have steamrolled the competition. As enterprises look to secure cloud-native environments, open source is the critical piece

React to this headline:

Loading spinner

Cloud-native security hinges on open source Read More »

How to create SBOMs for container images

How to create SBOMs for container images 21/06/2023 at 09:06 By Help Net Security The importance of software bills of materials (SBOMs) has grown substantially in recent years as organizations recognize the need for greater transparency in the software supply chain. This focus on SBOMs is a response to increasing cybersecurity threats and legislative efforts

React to this headline:

Loading spinner

How to create SBOMs for container images Read More »

The significance of CIS Control mapping in the 2023 Verizon DBIR

The significance of CIS Control mapping in the 2023 Verizon DBIR 20/06/2023 at 07:48 By Help Net Security Verizon’s recently released 2023 Data Breach Investigation Report (DBIR) provides organizations with a comprehensive analysis of the evolving threat landscape and valuable insights into incident types and vulnerabilities. This year, the report includes the mapping of CIS

React to this headline:

Loading spinner

The significance of CIS Control mapping in the 2023 Verizon DBIR Read More »

Goodbyes are difficult, IT offboarding processes make them harder

Goodbyes are difficult, IT offboarding processes make them harder 19/06/2023 at 07:32 By Help Net Security When employees, contractors and service providers leave an organization, they take with them knowledge, capabilities, and professional achievements. They should leave behind any proprietary or confidential data belonging to the organization, but Osterman Research found that 69% of organizations

React to this headline:

Loading spinner

Goodbyes are difficult, IT offboarding processes make them harder Read More »

Red teaming can be the ground truth for CISOs and execs

Red teaming can be the ground truth for CISOs and execs 16/06/2023 at 08:03 By Help Net Security This year, against the backdrop of attacks on everyone from healthcare institutions and schools to financial services organizations, as well as the introduction of legislation across the UK and EU to move security up the agenda, cybersecurity

React to this headline:

Loading spinner

Red teaming can be the ground truth for CISOs and execs Read More »

How secure is your vehicle with digital key technology?

How secure is your vehicle with digital key technology? 15/06/2023 at 08:22 By Help Net Security Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the automotive industry. While there are a few different approaches to implementing digital keys for automotive use, a secure digital

React to this headline:

Loading spinner

How secure is your vehicle with digital key technology? Read More »

Beyond MFA: 3 steps to improve security and reduce customer authentication friction

Beyond MFA: 3 steps to improve security and reduce customer authentication friction 14/06/2023 at 07:42 By Help Net Security For many people, life’s fundamental activities are now conducted online. We do our banking and shopping online, turn to the digital realm for entertainment and to access medical records, and pursue our romantic interests via dating

React to this headline:

Loading spinner

Beyond MFA: 3 steps to improve security and reduce customer authentication friction Read More »

How to achieve cyber resilience?

How to achieve cyber resilience? 13/06/2023 at 07:32 By Help Net Security Cyber resilience is a leading strategic priority today, and most enterprises are now pursuing programs to bolster their ability to mitigate attacks. Yet despite the importance placed on cyber resilience, many organizations struggle to measure their capabilities or track their progress. They are

React to this headline:

Loading spinner

How to achieve cyber resilience? Read More »

Scroll to Top