What’s polluting your data lake?

A data lake is a large system of files and unstructured data collected from many, untrusted sources, stored and dispensed for business services, and is susceptible to malware pollution. As enterprises continue to produce, collect, and store more data, … Continue reading What’s polluting your data lake?

Your vendors are likely your biggest cybersecurity risk

As speed of business increases, more and more organizations are looking to either buy companies or outsource more services to gain market advantage. With organizations expanding their vendor base, there is a critical need for holistic third-party risk … Continue reading Your vendors are likely your biggest cybersecurity risk

US-based CISOs get nearly $1 million per year

The role of the Chief Information Security Officer (CISO) is a relatively new senior-level executive position within most organizations, and is still evolving. To find out how current CISOs landed in that role, their aspirations, the compensation they … Continue reading US-based CISOs get nearly $1 million per year

How vulnerable supply chains threaten cloud security

Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their overall security strategy to the evolving landscape, according to a Proofpoint stud… Continue reading How vulnerable supply chains threaten cloud security

Organizations are losing cyber insurance as an important risk management tool

The number of organizations that will be either unable to afford cyber insurance, be declined cover, or experience significant coverage limitations is set to double in 2023, according to Huntsman Security. This Help Net Security video uncovers why so m… Continue reading Organizations are losing cyber insurance as an important risk management tool

Why it’s past time we operationalized cybersecurity

Enterprises are investing more in cybersecurity than ever before, but we’re also seeing a record number of breaches. More than 5.1 billion pieces of personal information were reported stolen last year, and the average cost of a breach has climbed to $4… Continue reading Why it’s past time we operationalized cybersecurity

Tackling the dangers of internal communications: What can companies do?

In this interview for Help Net Security, Devin Redmond, CEO at Theta Lake, talks about the risk of internal communications and what companies can do to keep themselves safe. The pandemic has greatly changed internal communications within organizations … Continue reading Tackling the dangers of internal communications: What can companies do?

As the cost of cyber insurance rises, the number of organizations who can’t afford it is set to double

The number of organizations that will be either unable to afford cyber insurance, be declined cover, or experience significant coverage limitations is set to double in 2023, according to Huntsman Security. Even for those insured, the perfect storm of o… Continue reading As the cost of cyber insurance rises, the number of organizations who can’t afford it is set to double

36% of orgs expose insecure FTP protocol to the internet, and some still use Telnet

A significant percentage of organizations expose insecure or highly sensitive protocols, including SMB, SSH, and Telnet, to the public internet, the ExtraHop Benchmarking Cyber Risk and Readiness report has shown. Whether intentional or accidental, the… Continue reading 36% of orgs expose insecure FTP protocol to the internet, and some still use Telnet

Organizations need to change their strategy to reduce cyber risk

Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of current threats, according to Skybox Security. As a result, 27% of all executives … Continue reading Organizations need to change their strategy to reduce cyber risk