Enterprises remain vulnerable through compromised API secrets

Cybersecurity professionals are frustrated over how much time and attention they must devote to API security and worried that their defenses still need to be improved, according to Corsha. Researchers recently surveyed over 400 security and engineering… Continue reading Enterprises remain vulnerable through compromised API secrets

EU cyber resilience regulation could translate into millions in fines

The EU Commission’s Cyber Resilience Act (CRA) is intended to close the digital fragmentation problem surrounding devices and systems with network connections – from printers and routers to smart household appliances and industrial control system… Continue reading EU cyber resilience regulation could translate into millions in fines

How can businesses decrease cyber insurance premiums while maintaining coverage?

In 2022, significant geopolitical developments have led to equally significant changes within the cyber insurance market. In this Help Net Security video, Chris Denbigh-White, Global Director of Customer Success for Next DLP, discusses how, with the in… Continue reading How can businesses decrease cyber insurance premiums while maintaining coverage?

Connected homes are expanding, so is attack volume

78% Americans report unsafe online behaviors that open them up to cyber threats, such as reusing or sharing passwords, skipping software updates and more – a 14% increase from just two years ago, according to Comcast. “This holiday season consume… Continue reading Connected homes are expanding, so is attack volume

Most startups have cyber insurance but are uncertain about how much risk is covered

Despite the significant economic headwinds startups currently face – from a challenging fundraising landscape to inflation woes and difficult operational decisions – company founders remain pointedly focused on advancing their cybersecurity protections… Continue reading Most startups have cyber insurance but are uncertain about how much risk is covered

Insights into insider threats: Detecting and monitoring abnormal user activity

A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever the motivation, compromised enterprise systems are the ultimate results. In th… Continue reading Insights into insider threats: Detecting and monitoring abnormal user activity

Financial organizations more prone to accidental data leakage

Netwrix announced additional findings for the financial and banking sector from its global 2022 Cloud Security Report. Compared to other industries surveyed, financial institutions are much more concerned about users who have legitimate access to their… Continue reading Financial organizations more prone to accidental data leakage

Why are K-12 educational institutions reluctant to report cyber incidents?

A recent report from the US Government Accountability Office (GAO) has shown that K-12 educational institutions are reluctant to report cyber incidents as they fear they would be penalized. During the fiscal year of 2022, FSA received 409 incident repo… Continue reading Why are K-12 educational institutions reluctant to report cyber incidents?

Identifying key areas for fraud risk during the recession

As economic pressure increases, so does fraud risk. While the world slides into a recession, the resulting increased debt, supply chain delays, and inflation create increased pressure on individuals to make ends meet. From a business perspective, as sa… Continue reading Identifying key areas for fraud risk during the recession

EU Council adopts the NIS2 directive

The European Council adopted legislation for a high common level of cybersecurity across the Union, to further improve the resilience and incident response capacities of both the public and private sector and the EU as a whole. The new directive, calle… Continue reading EU Council adopts the NIS2 directive