Don’t ignore the security risks of limitless cloud data

Over the past two decades, technology has evolved to make it easy and affordable for companies to collect, store and use massive amounts of data. From AWS to Google Cloud to Snowflake, even startups and small businesses can quickly establish a mature d… Continue reading Don’t ignore the security risks of limitless cloud data

Compliance initiatives can advance your organization’s security journey

Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at least a minimal set of security controls. In this Help Net Security video, Chri… Continue reading Compliance initiatives can advance your organization’s security journey

The various ways ransomware impacts your organization

Despite increased investment in tools to fight ransomware, 90% of organizations were affected by ransomware in some capacity over the past 12 months, according to SpyCloud’s 2022 Ransomware Defense Report. Allocation of security budgets Responden… Continue reading The various ways ransomware impacts your organization

Companies spending $6M on ransomware mitigation: Is it working?

A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation tactics and the operational impact of incidents. Eighty percent of companies … Continue reading Companies spending $6M on ransomware mitigation: Is it working?

Companies spending $6M on ransomware mitigation: Is it working?

A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation tactics and the operational impact of incidents. Eighty percent of companies … Continue reading Companies spending $6M on ransomware mitigation: Is it working?

Building confidence in your system’s security with chaos engineering

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient systems. Could you explain the discipline of chaos engineering? The practice ar… Continue reading Building confidence in your system’s security with chaos engineering

Building confidence in your system’s security with chaos engineering

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient systems. Could you explain the discipline of chaos engineering? The practice ar… Continue reading Building confidence in your system’s security with chaos engineering

API security: Understanding the next top attack vector

Application Programming Interfaces (APIs) underpin today’s digital ecosystem as the essential connective tissue that allows companies to exchange data and information quickly and securely. As the post-pandemic world leans heavily on digital interaction… Continue reading API security: Understanding the next top attack vector

Ransomware and terrorism: For security pros the threat is equal

Venafi announced the findings of a global survey of more than 1,500 IT security decision makers that reveals that 60% of security professionals believe ransomware threats should be prioritized at the same level as terrorism. These opinions echo the U.S… Continue reading Ransomware and terrorism: For security pros the threat is equal

Control failures are behind a growing number of cybersecurity incidents

Data from a survey of 1,200 enterprise security leaders reveals that an increase in tools and manual reporting combined with control failures are contributing to the success of threats such as ransomware, which costs organizations an average of $1.85 m… Continue reading Control failures are behind a growing number of cybersecurity incidents