How to withstand the onslaught of cybersecurity threats

“We brought a shovel to fight an avalanche.” That’s the sentiment shared by many business leaders, especially CISOs, CIOs and IT leaders as they face the current cybersecurity threat landscape. Like an avalanche, it’s constantly shifting and changing, … Continue reading How to withstand the onslaught of cybersecurity threats

CISOs confront mounting obstacles in tracking cyber assets

Monitoring assets in ever-changing settings operating in both development and production stages presents challenges. In this Help Net Security video, Daniel Deeney, CEO at Paladin Cloud, discusses how companies face difficulties identifying security th… Continue reading CISOs confront mounting obstacles in tracking cyber assets

Best practices for implementing a company-wide risk analysis program

For most organizations today, the threat surface is broad and getting broader. There are the obvious concerns like the user base, remote or BYOD computing, on-premises infrastructure, and cloud, SaaS, and virtual environments. But as companies and supp… Continue reading Best practices for implementing a company-wide risk analysis program

Meet fundamental cybersecurity needs before aiming for more

In this interview for Help Net Security, Mike Lefebvre, Director of Cybersecurity at SEI, talks about the hierarchy of cybersecurity needs and what should be done to meet them properly. We have all heard about the hierarchy of human needs, but what abo… Continue reading Meet fundamental cybersecurity needs before aiming for more

Asset risk management: Getting the basics right

In this interview with Help Net Security, Yossi Appleboum, CEO at Sepio, talks about asset risk management challenges for different industries and where it’s heading. Cyberattacks show no signs of slowing down. What do organizations need to do to… Continue reading Asset risk management: Getting the basics right

How a cyber asset management strategy can help enterprises detect threats

Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are nothing new, Verizon’s recently released Data Breach Investigations Report shows … Continue reading How a cyber asset management strategy can help enterprises detect threats

Is your organization ready for Internet Explorer retirement?

June 15, 2022, is the day that Microsoft will stop supporting most versions of Internet Explorer 11, and organizations should have ensured that they ready for its retirement. But are they? Internet Explorer retirement does not equal death Slowly but re… Continue reading Is your organization ready for Internet Explorer retirement?

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring

Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted at cybersecurity and IT professionals in both the U.S. and UK. The problem wi… Continue reading 40% of enterprises don’t include business-critical systems in their cybersecurity monitoring

308,000 exposed databases discovered, proper management is key

Group-IB carried out a deep dive into exposed digital assets discovered in 2021. During the research, the attack surface management team analyzed instances hosting internet-facing databases. The findings showed that in the second half of 2021, the numb… Continue reading 308,000 exposed databases discovered, proper management is key

Siloed technology management increases operational blind spots and cyber risk

Oomnitza revealed a snapshot survey, conducted by Gatepoint Research, which found that siloed technology management is increasing operational blind spots and cyber risk. While 76% of enterprises employ multiple systems to oversee the underlying technol… Continue reading Siloed technology management increases operational blind spots and cyber risk