How to automate configuration review

Configuration management can be challenging. IT teams can become overwhelmed between various standards, compliance requirements, and security options. As the popularity of remote work grows, so does the complexity of implementing secure configurations…. Continue reading How to automate configuration review

Good security habits: Leveraging the science behind how humans develop habits

In this interview with Help Net Security, George Finney, CSO at Southern Methodist University, explains what good security habits are, how to successfully implement them and why are they important. He also talks about his book Well Aware and what inspi… Continue reading Good security habits: Leveraging the science behind how humans develop habits

How to close the cybersecurity workforce gap

(ISC)² released the findings of its 2021 (ISC)² Cybersecurity Workforce Study. The study reveals updated figures for both the Cybersecurity Workforce Estimate and the Cybersecurity Workforce Gap in 2021, provides key insights into the makeup of the pro… Continue reading How to close the cybersecurity workforce gap

The CISO’s guide to evaluating third-party security platforms

A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you remediate risk if your vendors fall short. And the right third-party security managem… Continue reading The CISO’s guide to evaluating third-party security platforms

Electronic warfare: The critical capability of dominating the electromagnetic spectrum

In this interview with Help Net Security, Nick Myers, Director of Business Development, Electronic Combat Solutions at BAE Systems, talks about the evolution of electronic warfare, how it works, and why it’s important to invest in such technology… Continue reading Electronic warfare: The critical capability of dominating the electromagnetic spectrum

Critical infrastructure IoT security: Going back to basics

In this interview with Help Net Security, James Carder, CSO & VP of Labs at LogRhythm, talks about critical infrastructure IoT security, the vulnerabilities that are plaguing this type of technology, and how to tackle the growing number of cyberse… Continue reading Critical infrastructure IoT security: Going back to basics

Do you have a plan for your cybersecurity career? Time to skill up!

Gerald Auger is a Managing Partner at Coastal Information Security Group, and Chief Content Creator at Simply Cyber. In this interview with Help Net Security, he talks about the cybersecurity skills shortage, the value of certification, as well as &#82… Continue reading Do you have a plan for your cybersecurity career? Time to skill up!

Official (ISC)² CISSP CBK Reference: Out with the old, in with the new

Arthur Deane is a Senior Director at Capital One Financial, where he leads cybersecurity activities in the Card division. He is also the co-author of the Official (ISC)² CISSP CBK Reference, 6th edition. In this interview with Help Net Security, he dis… Continue reading Official (ISC)² CISSP CBK Reference: Out with the old, in with the new

Leveraging threat intelligence to tackle supply chain vulnerabilities

In this interview with Help Net Security, Brandon Hoffman, CISO at Intel 471, talks about the growing threat of supply chain attacks, the most common supply chain vulnerabilities and how the right threat intelligence can help stay on top of these threa… Continue reading Leveraging threat intelligence to tackle supply chain vulnerabilities