The significance of CIS Control mapping in the 2023 Verizon DBIR

Verizon’s recently released 2023 Data Breach Investigation Report (DBIR) provides organizations with a comprehensive analysis of the evolving threat landscape and valuable insights into incident types and vulnerabilities. This year, the report in… Continue reading The significance of CIS Control mapping in the 2023 Verizon DBIR

Building a culture of security awareness in healthcare begins with leadership

With the rise of modern trends such as cloud computing and remote work, healthcare institutions strive to balance accessibility, convenience, and robust security. In this Help Net Security interview, Ken Briggs, General Counsel at Salucro, discusses ho… Continue reading Building a culture of security awareness in healthcare begins with leadership

The benefit of adopting a hacker mindset for building security strategies

As VP of Research at Pentera, Alex Spivakovsky leads a team of former pen-testers, red-teamers, and incident response experts whose job is to bypass existing security controls. In this Help Net Security video, Spivakovsky discusses the misconception th… Continue reading The benefit of adopting a hacker mindset for building security strategies

Don’t ignore the security risks of limitless cloud data

Over the past two decades, technology has evolved to make it easy and affordable for companies to collect, store and use massive amounts of data. From AWS to Google Cloud to Snowflake, even startups and small businesses can quickly establish a mature d… Continue reading Don’t ignore the security risks of limitless cloud data

Compliance initiatives can advance your organization’s security journey

Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at least a minimal set of security controls. In this Help Net Security video, Chri… Continue reading Compliance initiatives can advance your organization’s security journey

The various ways ransomware impacts your organization

Despite increased investment in tools to fight ransomware, 90% of organizations were affected by ransomware in some capacity over the past 12 months, according to SpyCloud’s 2022 Ransomware Defense Report. Allocation of security budgets Responden… Continue reading The various ways ransomware impacts your organization

Companies spending $6M on ransomware mitigation: Is it working?

A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation tactics and the operational impact of incidents. Eighty percent of companies … Continue reading Companies spending $6M on ransomware mitigation: Is it working?

Companies spending $6M on ransomware mitigation: Is it working?

A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation tactics and the operational impact of incidents. Eighty percent of companies … Continue reading Companies spending $6M on ransomware mitigation: Is it working?

Building confidence in your system’s security with chaos engineering

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient systems. Could you explain the discipline of chaos engineering? The practice ar… Continue reading Building confidence in your system’s security with chaos engineering

Building confidence in your system’s security with chaos engineering

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient systems. Could you explain the discipline of chaos engineering? The practice ar… Continue reading Building confidence in your system’s security with chaos engineering