Will vacancies create security voids?

Automation may be shortening the Mean Time to Response (MTTR) when it comes to detecting and responding to attacks, but there is still no substitute for the human in the kill chain. Playbooks need to be constructed by security professionals, triggers i… Continue reading Will vacancies create security voids?

Why a modern vulnerability management strategy requires state-of-the-art solutions

In this interview with Help Net Security, Stephen Carter, CEO at Nucleus Security, explains the importance of having a vulnerability management strategy within an organization, what are the biggest challenges and what should be done to overcome them. V… Continue reading Why a modern vulnerability management strategy requires state-of-the-art solutions

How fast can organizations respond to a cybersecurity crisis?

Immersive Labs launched an analysis of human cyber capabilities. The report analyzed cyber knowledge, skills and judgment from over half a million exercises and simulations run by more than 2,100 organizations in the last 18 months. These were broken d… Continue reading How fast can organizations respond to a cybersecurity crisis?

Perennial security challenges hampering organizations in achieving their security objectives

Arctic Wolf published a report, providing insight into the current and future state of cybersecurity teams as they attempt to move their security programs forward while dealing with an ever-evolving threat environment. The report is based on findings f… Continue reading Perennial security challenges hampering organizations in achieving their security objectives

How Log4Shell remediation interfered with organizations’ cybersecurity readiness

(ISC)² published the results of an online poll examining the Log4j vulnerability and the human impact of the efforts to remediate it. Cybersecurity professionals from around the globe shared their experiences and opinions, revealing the severity and lo… Continue reading How Log4Shell remediation interfered with organizations’ cybersecurity readiness

Cloud security training is pivotal as demand for cloud services explode

Change is afoot. The private, public and third sector are transitioning from on-premises and datacenter-hosted infrastructure to hybrid architectures utilizing software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) hosted on a variety of c… Continue reading Cloud security training is pivotal as demand for cloud services explode

Enterprise data safety during the Great Resignation

71% of IT leaders have said that the ‘Great Resignation’ has increased security risks in their organizations, according to a survey of 2,000 employees in UK and US businesses, from Tessian. Data also revealed that 45% of IT leaders have already seen in… Continue reading Enterprise data safety during the Great Resignation

Cybersecurity staff turnover and burnout: How worried should organizations be?

The heightened risk of cyberattacks on businesses is being compounded by significant recruitment and retention issues within cybersecurity teams, making businesses more vulnerable to potential attacks, according to a research from ThreatConnect. With t… Continue reading Cybersecurity staff turnover and burnout: How worried should organizations be?

Technology-related employment still going strong, unemployment rate for IT jobs dropping to 2%

Technology-related employment and hiring opportunities continue to expand, according to an analysis by CompTIA. December’s technology employment gains bucked the generally underwhelming national employment trend. Technology industry companies add… Continue reading Technology-related employment still going strong, unemployment rate for IT jobs dropping to 2%