strategy

Security in the impending age of quantum computers

Security in the impending age of quantum computers 09/11/2023 at 09:02 By Help Net Security Quantum computing is poised to be one of the most important technologies of the 21st century. With global governments having collectively pledged more than $38 billion in public funds for quantum technologies and $2.1 billion of new private capital flowing […]

React to this headline:

Loading spinner

Security in the impending age of quantum computers Read More »

Microsegmentation proves its worth in ransomware defense

Microsegmentation proves its worth in ransomware defense 07/11/2023 at 07:32 By Help Net Security The number of ransomware attacks (successful and unsuccessful) has doubled over the past two years, from 43 on average in 2021 to 86 in 2023, according to Akamai. Security organizations have responded to the recent rise in ransomware attacks by implementing

React to this headline:

Loading spinner

Microsegmentation proves its worth in ransomware defense Read More »

Securing data at the intersection of the CISO and CDO

Securing data at the intersection of the CISO and CDO 06/11/2023 at 08:34 By Help Net Security Two groups in particular play a key and critical role in ensuring data governance and security: the CISO and the CDO. CISOs are responsible for identifying and managing risks associated with data security, while CDOs are responsible for

React to this headline:

Loading spinner

Securing data at the intersection of the CISO and CDO Read More »

Microsoft launches new initiative to augment security

Microsoft launches new initiative to augment security 03/11/2023 at 14:48 By Zeljka Zorz Nearly 22 years after Bill Gates announced a concerted Microsoft-wide push to deliver Trustworthy Computing, the company is launching the Secure Future Initiative, to boost the overall security of Microsoft’s products and its customers and users. A new Microsoft initiative focused on

React to this headline:

Loading spinner

Microsoft launches new initiative to augment security Read More »

AI is transforming financial crime compliance

AI is transforming financial crime compliance 03/11/2023 at 07:01 By Help Net Security While 86% of compliance, operations, risk and IT professionals at banks and non-banking financial institutions (NBFIs) surveyed said they would increase spending on AI and ML over the next two years, a 93% of respondents said that instead of using automation to

React to this headline:

Loading spinner

AI is transforming financial crime compliance Read More »

Cybersecurity workforce shortages: 67% report people deficits

Cybersecurity workforce shortages: 67% report people deficits 02/11/2023 at 09:02 By Help Net Security The global cybersecurity workforce has reached 5.5 million people, an 8.7% increase from 2022, representing 440,000 new jobs, according to ISC2. While this is the highest workforce ever recorded, the report shows that demand is still outpacing the supply. The cybersecurity

React to this headline:

Loading spinner

Cybersecurity workforce shortages: 67% report people deficits Read More »

How human behavior research informs security strategies

How human behavior research informs security strategies 02/11/2023 at 08:01 By Mirko Zorz In this Help Net Security interview, Kai Roer, CEO at Praxis Security Labs, explores the theoretical underpinnings, practical implications, and the crucial role of human behavior in cybersecurity. Roer explains why a comprehensive understanding of human complexity is paramount in today’s security

React to this headline:

Loading spinner

How human behavior research informs security strategies Read More »

From Windows 9x to 11: Tracing Microsoft’s security evolution

From Windows 9x to 11: Tracing Microsoft’s security evolution 31/10/2023 at 09:01 By Mirko Zorz Over its journey from Windows 9x to Windows 11, Microsoft has implemented multiple security overhauls, each addressing the challenges of its time and setting the stage for future developments. In this Help Net Security interview, we feature security researcher Alex

React to this headline:

Loading spinner

From Windows 9x to 11: Tracing Microsoft’s security evolution Read More »

White House issues Executive Order for safe, secure, and trustworthy AI

White House issues Executive Order for safe, secure, and trustworthy AI 30/10/2023 at 15:47 By Help Net Security President Biden issued a landmark Executive Order to ensure that America leads the way in seizing the promise and managing the risks of artificial intelligence (AI). New standards for AI safety and security As AI’s capabilities grow,

React to this headline:

Loading spinner

White House issues Executive Order for safe, secure, and trustworthy AI Read More »

Companies scramble to integrate immediate recovery into ransomware plans

Companies scramble to integrate immediate recovery into ransomware plans 30/10/2023 at 08:01 By Help Net Security More than one-third of companies still do not have a well-rounded, holistic ransomware strategy in place, according to Zerto. Immediate recovery crucial for businesses’ survival The survey also found that companies are reevaluating their data protection and cyber resilience

React to this headline:

Loading spinner

Companies scramble to integrate immediate recovery into ransomware plans Read More »

Strategies to overcome cybersecurity misconceptions

Strategies to overcome cybersecurity misconceptions 25/10/2023 at 07:02 By Help Net Security Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net Security video, Kevin Kirkwood, Deputy CISO at LogRhythm, stresses that one of the most significant pitfalls

React to this headline:

Loading spinner

Strategies to overcome cybersecurity misconceptions Read More »

Scaling rapidly? Your application security strategies need to keep up

Scaling rapidly? Your application security strategies need to keep up 23/10/2023 at 07:01 By Help Net Security Modern application security strategies must support and enable modern software development, even as it rapidly scales, according to Mend.io. Just 52% of companies can effectively remediate critical vulnerabilities and only 41% are confident they can manage the security

React to this headline:

Loading spinner

Scaling rapidly? Your application security strategies need to keep up Read More »

The real impact of the cybersecurity poverty line on small organizations

The real impact of the cybersecurity poverty line on small organizations 20/10/2023 at 07:03 By Mirko Zorz The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO at Afni, delves into the realities and myths surrounding the cybersecurity poverty line,

React to this headline:

Loading spinner

The real impact of the cybersecurity poverty line on small organizations Read More »

Addressing cyber threats in healthcare operational technology

Addressing cyber threats in healthcare operational technology 19/10/2023 at 07:01 By Help Net Security The proliferation of connected medical devices (IoMT) in hospitals demands a holistic approach to cybersecurity beyond just the digital IT realm. Industrial cybersecurity (OT) requires integrated solutions to address its unique challenges. In this Help Net Security video, Estefanía Rojas Campos,

React to this headline:

Loading spinner

Addressing cyber threats in healthcare operational technology Read More »

Cyber resilience starts in the C-suite

Cyber resilience starts in the C-suite 19/10/2023 at 06:33 By Help Net Security In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs or managing directors and 21% of other senior leaders are heavily involved, according to Commvault. According to the research, 52% of senior

React to this headline:

Loading spinner

Cyber resilience starts in the C-suite Read More »

The evolution of deception tactics from traditional to cyber warfare

The evolution of deception tactics from traditional to cyber warfare 18/10/2023 at 07:33 By Mirko Zorz Admiral James A. Winnefeld, USN (Ret.), is the former vice chairman of the Joint Chiefs of Staff and is an advisor to Acalvio Technologies. In this Help Net Security interview, he compares the strategies of traditional and cyber warfare,

React to this headline:

Loading spinner

The evolution of deception tactics from traditional to cyber warfare Read More »

10 essential cybersecurity cheat sheets available for free

10 essential cybersecurity cheat sheets available for free 18/10/2023 at 07:02 By Help Net Security Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to download. Whether you’re seeking a quick refresher or a beginner trying to make sense of

React to this headline:

Loading spinner

10 essential cybersecurity cheat sheets available for free Read More »

SMBs seek help as cyber threats reach an all-time high

SMBs seek help as cyber threats reach an all-time high 18/10/2023 at 06:32 By Help Net Security Understanding the evolving threat landscape is the biggest cybersecurity challenge facing SMBs, including non-for-profit organizations – and more than half are calling for help to manage the risks, according to Sage. Globally, 48% of SMBs have experienced a

React to this headline:

Loading spinner

SMBs seek help as cyber threats reach an all-time high Read More »

How to go from collecting risk data to actually reducing risk?

How to go from collecting risk data to actually reducing risk? 17/10/2023 at 08:17 By Help Net Security Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move beyond finding risks to effectively mitigating risk. Making that transition starts with a shift from using “risks

React to this headline:

Loading spinner

How to go from collecting risk data to actually reducing risk? Read More »

The collaborative power of CISOs, CTOs and CIOs for a secure future

The collaborative power of CISOs, CTOs and CIOs for a secure future 17/10/2023 at 07:03 By Mirko Zorz In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report on board collaboration with the C-suite — particularly the CIO, CTO, and CISO to stay current with

React to this headline:

Loading spinner

The collaborative power of CISOs, CTOs and CIOs for a secure future Read More »

Scroll to Top