The role of automation in staying on top of the evolving threat landscape

In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how automation could improve the way organizations detect and respond to attacks… Continue reading The role of automation in staying on top of the evolving threat landscape

Compliance failures caused by lack of embedded controls into employee processes

Compliance teams that don’t embed their controls into employee processes face a significantly higher rate of compliance failures, according to a survey by Gartner. The survey of 755 employees in April 2021 found these failures linked to unnecessary com… Continue reading Compliance failures caused by lack of embedded controls into employee processes

Ransomware attacks: The power of adaptation

The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this interview with Help Net Security, David Taylor, managing director, Incident Resp… Continue reading Ransomware attacks: The power of adaptation

Securing your WordPress website against ransomware attacks

It’s no surprise to anyone who works in security that there’s been an explosion in ransomware incidents over the last two years, costing companies across various industries millions of dollars. According to a recent report from the Institute for Securi… Continue reading Securing your WordPress website against ransomware attacks

The age of AI-powered devices at the edge

The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that rely on traditional intelligence and analytics tools. Historically, thes devices have b… Continue reading The age of AI-powered devices at the edge

Out with the old, in with the new: From VPNs to ZTNA

The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and individuals across the globe, but now the tide is turning. As technology advance… Continue reading Out with the old, in with the new: From VPNs to ZTNA

Critical infrastructure today: Complex challenges and rising threats

Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity experts have been sounding the alarm for years. In this interview with Help Net… Continue reading Critical infrastructure today: Complex challenges and rising threats

Previous employees with access to corporate data remain a threat to businesses

Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to corporate data. This is according to A research by My1Login, which found few … Continue reading Previous employees with access to corporate data remain a threat to businesses

The cybersecurity of industrial companies remains low, potential damage can be severe

Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. Among key findings, an external attacker can penetrate the corporate network … Continue reading The cybersecurity of industrial companies remains low, potential damage can be severe

The cybersecurity metrics required to make Biden’s Executive Order impactful

For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve cybersecurity. Recently, President Biden issued the Executive Order on Improving … Continue reading The cybersecurity metrics required to make Biden’s Executive Order impactful