Third-party risk management best practices and why they matter

With organizations increasingly relying on third-party vendors, upping the third-party risk management (TPRM) game has become imperative to prevent the fallout of third-party compromises. Third-party risks SecurityScorecard recently found that 98% of o… Continue reading Third-party risk management best practices and why they matter

The effect of omission bias on vulnerability management

Whether we’d like to admit it to ourselves or not, all humans harbor subconscious biases that powerfully influence our behavior. One of these is the omission bias, which has interesting ramifications in the world of cyber security, specifically vulnera… Continue reading The effect of omission bias on vulnerability management

Why resilience leaders must prepare for polycrises

In this Help Net Security video, Frank Shultz, CEO of Infinite Blue, discusses how more frequent and severe disruptions and our increasingly interconnected world collide to create a new threat for resilience leaders to manage: polycrises. These multipl… Continue reading Why resilience leaders must prepare for polycrises

Global cyber inequity skyrockets

There has been a sharp increase in cyber inequity globally, with 90% of executives warning that urgent action is needed to address it, according to the World Economic Forum. While increased geopolitical tensions and economic instability continue to con… Continue reading Global cyber inequity skyrockets

The right strategy for effective cybersecurity awareness

Employees play a significant role in safeguarding organizational assets. With a constantly evolving threat landscape, cybersecurity awareness training is an essential component in creating a good security culture. Why cybersecurity awareness training? … Continue reading The right strategy for effective cybersecurity awareness

How executives adapt to rising cybersecurity concerns in mobile networks

In this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in network operators as they struggle to protect consumers from sophisticated (usual… Continue reading How executives adapt to rising cybersecurity concerns in mobile networks

Staying ahead in 2024 with top cybersecurity predictions

What will 2024 hold for the cybersecurity landscape? In this Help Net Security video, Steve Cobb, CISO at SecurityScorecard, offers his take on what professionals can expect next year.
The post Staying ahead in 2024 with top cybersecurity predictions a… Continue reading Staying ahead in 2024 with top cybersecurity predictions

Enterprises prepare for the inevitable cyber attack

Recent IDC research shows that in many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives. In fact, 52% of senior leaders have no involvement in their company’s cyber cases. In this… Continue reading Enterprises prepare for the inevitable cyber attack

Enterprises prepare for the inevitable cyber attack

Recent IDC research shows that in many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives. In fact, 52% of senior leaders have no involvement in their company’s cyber cases. In this… Continue reading Enterprises prepare for the inevitable cyber attack

Building cyber resilience for tomorrow’s threats

Cyber resilience is the capacity of an organization to maintain its core functions and swiftly adapt to, respond to, and recover from cyber threats. A cyber-resilient organization recognizes that cyber threats are inevitable and constantly evolves its … Continue reading Building cyber resilience for tomorrow’s threats