Common cloud security mistakes and how to avoid them

According to recent surveys, 98% of organizations keep their financial, business, customer and/or employee information in the cloud but, at the same time, 95% of cloud security professionals are not sure their security protections and their team would … Continue reading Common cloud security mistakes and how to avoid them

Third-party risk management best practices and why they matter

With organizations increasingly relying on third-party vendors, upping the third-party risk management (TPRM) game has become imperative to prevent the fallout of third-party compromises. Third-party risks SecurityScorecard recently found that 98% of o… Continue reading Third-party risk management best practices and why they matter

Fighting insider threats is tricky but essential work

Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats (75%). But which of the two is a bigger threat to a company? External vs insider threats External threats can cause gr… Continue reading Fighting insider threats is tricky but essential work

2024 brings new risks, with cyber incidents in the spotlight

Cyber incidents such as ransomware attacks, data breaches, and IT disruptions are the biggest worry for companies globally in 2024, according to Allianz. The closely interlinked peril of business interruption ranks second. Natural catastrophes (up from… Continue reading 2024 brings new risks, with cyber incidents in the spotlight

The reality of hacking threats in connected car systems

With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity c… Continue reading The reality of hacking threats in connected car systems

The power of AI in cybersecurity

The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber threat landscape and cybersecurity. AI as a powerful cybersecurity tool As organiza… Continue reading The power of AI in cybersecurity

Key elements for a successful cyber risk management strategy

In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel a… Continue reading Key elements for a successful cyber risk management strategy

The growing challenge of cyber risk in the age of synthetic media

As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. In this Help Net Security video, Mike Bechtel, Chief Futurist at Deloitte, di… Continue reading The growing challenge of cyber risk in the age of synthetic media

Review: Engineering-grade OT security: A manager’s guide

Andrew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer Science from the University of Calgary. He developed control system software p… Continue reading Review: Engineering-grade OT security: A manager’s guide

Which cybersecurity controls are organizations struggling with?

How are organizations performing across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework? A recent analysis by Bitsight and Google reveals some good and some bad results – and room for improvement. What is MVSP? Minimu… Continue reading Which cybersecurity controls are organizations struggling with?