Companies overwhelmed by available tech solutions

92% of executives reported challenges in acquiring new tech solutions, highlighting the complexities that go into the decision-making process, according to GlobalDots. Moreover, some 34% of respondents said the overwhelming amount of options was a chal… Continue reading Companies overwhelmed by available tech solutions

Active security budget evaluation plugs holes in your security stack

Every successful attack has breached the security stack. Once the foundation of good cybersecurity, firewalls, and other security products are not enough to block all of the sophisticated attacks that are being used by today’s attackers. In this … Continue reading Active security budget evaluation plugs holes in your security stack

Economic uncertainty is increasing cybersecurity risks

Cybercriminals are always seeking to make their attacks, scams and campaigns as effective as possible. This includes harnessing whatever is dominating the news agenda and is on their victims’ mind. Economic uncertainty and cybersecurity risks The… Continue reading Economic uncertainty is increasing cybersecurity risks

Security stack consolidation helps CISOs lower cybersecurity spending

In this Help Net Security video, Alfredo Hickman, Head of Information Security at Obsidian Security, discusses the importance of security stack consolidation for organizations looking to reduce security costs while increasing security efficiency and ef… Continue reading Security stack consolidation helps CISOs lower cybersecurity spending

Top outcomes organizations want from their security investments

Preventing data breaches and safeguarding remote workers are among the top security priorities and outcomes organizations want from their security investments, according to WithSecure. WithSecure polled over 3,000 IT decision makers, IT influencers, an… Continue reading Top outcomes organizations want from their security investments

How companies are prioritizing infosec and compliance priorities

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for which companies prioritize information security and compliance, which leaders con… Continue reading How companies are prioritizing infosec and compliance priorities

How to maximize your security budget while demonstrating ROI

The 2021 Positive Technologies Cybersecurity Threatscape report revealed that cyber attacks remain on the rise in the post-pandemic world, increasing by 17% compared to 2020. Ransomware remains the most-used malware by attackers. With the average ranso… Continue reading How to maximize your security budget while demonstrating ROI

Asset inventory management: What’s the ROI?

Asset inventory management is critical to any company’s planning and accounting process. Having an accurate, up-to-date view of every asset (all devices, equipment, vehicles, and properties) that your organization owns means that you can better optimiz… Continue reading Asset inventory management: What’s the ROI?

To identify cybersecurity vendor sustainability, start with the fundamentals

With $3.7 billion raised in cybersecurity funding so far this year, 2021 is on track to overcome last year’s record $7.8 billion total. Many of these companies have very high valuations – and to some experts that sounds like a bubble. As damage f… Continue reading To identify cybersecurity vendor sustainability, start with the fundamentals

The benefits of cyber threat intelligence

In this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence. He also talks about how Intel 471 approaches adversary and malware intelligence. Here’s a transcript… Continue reading The benefits of cyber threat intelligence