CISOs under pressure: Protecting sensitive information in the age of high employee turnover

In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust principles, identity access management, and managed sec… Continue reading CISOs under pressure: Protecting sensitive information in the age of high employee turnover

Employees worry less about cybersecurity best practices in the summer

IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, according to ThreatX. With more endpoints and applications in use, and often personal… Continue reading Employees worry less about cybersecurity best practices in the summer

Organizations actively embrace zero trust, integration remains a hurdle

IT teams have made security efforts and progress in zero-trust implementation strategies to establish a new sense of normalcy following the network upheaval caused by the start of the global pandemic. They have also addressed the need to secure remote … Continue reading Organizations actively embrace zero trust, integration remains a hurdle

Demand for STEM training skyrockets

The rapid pace of globalization, digital transformation, and AI advancements have created a renewed demand for digital and human skills among US learners, according to Coursera. “The rise of digital jobs and remote work is creating unprecedented opport… Continue reading Demand for STEM training skyrockets

Navigating cybersecurity in the age of remote work

In this Help Net Security interview, Jay Chaudhry, CEO at Zscaler, talks about connecting and securing remote employees and their devices to access organizational resources from any location. He discusses the potential risks of remote VPN access, the i… Continue reading Navigating cybersecurity in the age of remote work

The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals

The widespread adoption of remote and hybrid working practices in recent years has brought numerous benefits to various industries, but has also introduced new cyber threats, particularly in the critical infrastructure sector. These threats extend not … Continue reading The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals

Blacklist untrustworthy apps that peek behind your firewall

With an increasing number of endpoints and expanding attack surfaces, dodgy apps can offer a way around your firewall. Due to data privacy concerns, Montana has passed the first bill in the United States to ban TikTok. Previously, India has banned 59 C… Continue reading Blacklist untrustworthy apps that peek behind your firewall

Study of past cyber attacks can improve organizations’ defense strategies

Ransomware operators have been increasingly launching frequent attacks, demanding higher ransoms, and publicly exposing victims, leading to the emergence of an ecosystem that involves access brokers, ransomware service providers, insurance providers, a… Continue reading Study of past cyber attacks can improve organizations’ defense strategies