Security is slowly becoming essential to doing business

A veteran of the information security industry, Greg Jensen has spent the last six years at Oracle as the Senior Director of Oracle’s Cloud Security solutions. He’s also the Senior Editor of the Oracle and KPMG Cloud Threat Report, as well as Ora… Continue reading Security is slowly becoming essential to doing business

Targeted threat intelligence and what your organization might be missing

In this Help Net Security podcast recorded at Black Hat USA 2019, Adam Darrah (Director of Intelligence), Mike Kirschner (Chief Operating Officer) and Christian Lees (Chief Technology Officer) from Vigilate, talk about how their global threat hunting a… Continue reading Targeted threat intelligence and what your organization might be missing

CISO do’s and don’ts: Lessons learned

Keeping a business safe from cyber threats while allowing it to thrive is every CISO’s goal. The task is not easy: a CISO has to keep many balls in the air while being buffeted by an increasingly complex and always shifting threat landscape. Cons… Continue reading CISO do’s and don’ts: Lessons learned

Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being used for targeted surveillance of mobile phone users. The vulnerability and … Continue reading Simjacker vulnerability actively exploited to track, spy on mobile phone owners

How to navigate critical data security and privacy policy challenges

By 2020, there will be 40x more bytes of data than there are stars in the universe as we know it. And with data growth comes more security and privacy obstacles for organizations and business leaders to overcome. Unfortunately, there isn’t any room for… Continue reading How to navigate critical data security and privacy policy challenges

IIoT security challenges: Dealing with cutting edge technologies

Dr. Jesus Molina is the Director of Business Development at Waterfall Security Solutions, and in this interview with Help Net Security he talks about the security issues related to emerging technologies. What is the rate of adoption of the Industrial I… Continue reading IIoT security challenges: Dealing with cutting edge technologies

Regulations are driving innovation toward an identity layer on the Internet

The security community often points to the inherent lack of an encryption layer on the Internet as a factor behind many of the related threat vectors. The decentralized nature of the web, which has driven its near ubiquity, also makes it a vector for c… Continue reading Regulations are driving innovation toward an identity layer on the Internet

Shine a light on shadow IT to improve organizational resilience

Shadow IT is one of the biggest challenges facing organizations today. According to Gartner, by 2020, a third of all cybersecurity attacks experienced by enterprises will be from their shadow IT resources. This shadow IT infrastructure can be created, … Continue reading Shine a light on shadow IT to improve organizational resilience

Cybersecurity issues can’t be solved by simply buying a product

Year after year, data breach losses continue to rise and the cybercrime economy continues to thrive. What is the cybersecurity industry doing wrong? Vendors must genuinely want to improve their customers’ security posture If you ask Jeff Kohrman,… Continue reading Cybersecurity issues can’t be solved by simply buying a product