What financial records do companies need to keep, and for how long?

Companies generate stacks of documents and managing them correctly is crucial. It can be complicated to balance organizational requirements, employee interests, and legal restrictions. Proper record retention is especially important for certain financi… Continue reading What financial records do companies need to keep, and for how long?

5 factors to consider when choosing an encryption key management system

Data breaches are at an all-time high with 2019 looking to one of the worst on record for data loses. Within the data security battle, encryption is considered to be the gold standard that provides protection through the whole data lifecycle. With that… Continue reading 5 factors to consider when choosing an encryption key management system

The promise and peril of post quantum computing

In this Help Net Security podcast, Avesta Hojjati, Head of R&D at DigiCert, talks about the security implications of post quantum computing. Here’s a transcript of the podcast for your convenience. Good morning. Good afternoon everyone. My name is… Continue reading The promise and peril of post quantum computing

Defining risk controls that actually work

Previously, we looked at practical ideas for conducting the complex information security risk assessments that all enterprises should regularly perform. The right methodology will guide identifying the threats and vulnerabilities to which an organizati… Continue reading Defining risk controls that actually work

IoT is an ecosystem, as secure as its weakest link

Remember when, three years ago, several Mirai botnets hit DNS provider Dyn and caused part of the Internet to be unreachable for most users in North America and Europe? For a moment there it really seemed that IoT security would become an indisputable … Continue reading IoT is an ecosystem, as secure as its weakest link

How can security teams effectively monitor OT and ICS networks?

Modern industrial operations are complex and dynamic environments that have unique security challenges. Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, talks about the issues associated with creating a robust cybersecurity postur… Continue reading How can security teams effectively monitor OT and ICS networks?

A continuous problem: Tackling the cybersecurity skills shortage

We have read the over abundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and more interesting story. But first, let’s level set. This talent shortage is a … Continue reading A continuous problem: Tackling the cybersecurity skills shortage

Keeping up with the evolving ransomware security landscape

Cybercrime is ever-evolving, and is consistently becoming more effective and damaging. While the range of attack vectors available to malicious actors are vast, ransomware remains one of the most prolific forms of cybercrime and has held on to its top … Continue reading Keeping up with the evolving ransomware security landscape

Want to overcome patching challenges once and for all? Automation is the key

The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent Beaming report, UK businesses faced cyberattacks every 50 seconds in the sec… Continue reading Want to overcome patching challenges once and for all? Automation is the key

Is the enterprise on the brink of a global web supply chain attack?

Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a real security threat – and one which the enterprise is vastly unprepar… Continue reading Is the enterprise on the brink of a global web supply chain attack?