Healthcare cybersecurity: How to prevent the compromise of patient records?

Year after year, the number of data breaches affecting entities in the healthcare industry rises, and 2020 was no exception. The 616 data breaches reported this past year to the US Department of Health & Human Services (DHHS) have resulted in the … Continue reading Healthcare cybersecurity: How to prevent the compromise of patient records?

Third-party cloud providers: Expanding the attack surface

In this interview with Help Net Security, Fred Kneip, CEO at CyberGRX, talks about the lack of visibility into third-party risk, how to address this issue, and what companies should consider when choosing the right cloud provider. The pandemic has forc… Continue reading Third-party cloud providers: Expanding the attack surface

The impact of ransomware on cyber insurance driving the need for broader cybersecurity knowlege

The growing number of ransomware attacks has burdened many oganizations, but it has also greatly impacted the cyber insurance industry, which found itself having to cover large ransomware demands. This called for a chenge in policies but also the need … Continue reading The impact of ransomware on cyber insurance driving the need for broader cybersecurity knowlege

The role of automation in staying on top of the evolving threat landscape

In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how automation could improve the way organizations detect and respond to attacks… Continue reading The role of automation in staying on top of the evolving threat landscape

Ransomware attacks: The power of adaptation

The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this interview with Help Net Security, David Taylor, managing director, Incident Resp… Continue reading Ransomware attacks: The power of adaptation

How do I select a container security solution for my business?

The adoption of container architectures is growing steadily, but security and compliance remain top concerns for enterprises, a recent survey revealed. To select a suitable container security solution for your business, you need to think about a variet… Continue reading How do I select a container security solution for my business?

How getting a CISSP can change the course of a career

Technical certifications are increasingly in demand with 87% of IT employees possessing at least one and 40% pursuing their next, according to Questionmark. Despite cybersecurity pros being more likely to have earned vendor-specific credentials, they t… Continue reading How getting a CISSP can change the course of a career

Healthcare cybersecurity under attack: How the pandemic affected rural hospitals

Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who had been hit the most were the healthcare organizations. The change in their … Continue reading Healthcare cybersecurity under attack: How the pandemic affected rural hospitals

Critical infrastructure today: Complex challenges and rising threats

Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity experts have been sounding the alarm for years. In this interview with Help Net… Continue reading Critical infrastructure today: Complex challenges and rising threats