Good security habits: Leveraging the science behind how humans develop habits

In this interview with Help Net Security, George Finney, CSO at Southern Methodist University, explains what good security habits are, how to successfully implement them and why are they important. He also talks about his book Well Aware and what inspi… Continue reading Good security habits: Leveraging the science behind how humans develop habits

3 ways any company can guard against insider threats this October

October is Cybersecurity Awareness Month, but most business leaders and consumers don’t need a special event to remember cybersecurity’s preeminence in today’s turbulent digital landscape. Even so, a little reminder can’t hurt. With the average cost of… Continue reading 3 ways any company can guard against insider threats this October

Firms embracing hybrid working, but must ensure teams have the modern skills to stay productive

Employers must act now to ensure staff have the modern skills to stay productive during hybrid working, says Questionmark. While firms are continuing to let staff work remotely for at least some of the week, most employees have noticed dips in their pr… Continue reading Firms embracing hybrid working, but must ensure teams have the modern skills to stay productive

The role of automation in staying on top of the evolving threat landscape

In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how automation could improve the way organizations detect and respond to attacks… Continue reading The role of automation in staying on top of the evolving threat landscape

If encryption is so good at protecting data, why do so many businesses succumb to cyberattacks?

Cybercriminals use increasingly complex deception methods, and cybersecurity can be unfamiliar, unintuitive, or inconvenient to operate, recent Mimecast research reveals. No wonder most successful cyberattacks are due to human error. A secure email ser… Continue reading If encryption is so good at protecting data, why do so many businesses succumb to cyberattacks?

Demystifying cybersecurity with a more human-centric approach

Every business, whether small or large, needs to address cybersecurity to operate in today’s online world. This has been a stimulus for the cybersecurity industry and explains the market’s expected 10.9% growth from 2021 to 2028. As the industry has ma… Continue reading Demystifying cybersecurity with a more human-centric approach

How SCM Can Protect Against Skills-Based Errors and Mistakes

People make up an important part of an organization’s security posture. That’s because some employees have the rights necessary for accessing sensitive data as well as the privileges for viewing and/or editing critical systems. If those individuals hav… Continue reading How SCM Can Protect Against Skills-Based Errors and Mistakes

Top Cyber Security Challenges Post Lockdown

By Sam Jones | Cyber Tec Security
Not too long ago things were looking bleak for the world, still under the dark cloud of the COVID pandemic, but with vaccine rollouts now taking place worldwide, there is finally a light at the end of the tun… Continue reading Top Cyber Security Challenges Post Lockdown

Remote working security concerns still lingering

Despite being over a year into remote working and looking ahead to likely shifts to hybrid remote/in-office working models, 82% of businesses still remain concerned about the security risks of employees working remotely. This is just one of the key ins… Continue reading Remote working security concerns still lingering

Cybersecurity industry analysis: Another recurring vulnerability we must correct

I have spent my career finding, fixing, discussing, and breaking down software vulnerabilities, one way or another. I know that when it comes to some common security bugs, despite being in our orbit since the 90s, they continue to plague our software a… Continue reading Cybersecurity industry analysis: Another recurring vulnerability we must correct