Security and privacy strategies for CISOs in a mobile-first world

In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introduc… Continue reading Security and privacy strategies for CISOs in a mobile-first world

Cybersecurity pros change strategies to combat AI-powered threats

75% of security professionals had to change their cybersecurity strategy in the last year due to the rise in AI-powered cyber threats, with 73% expressing a greater focus on prevention capabilities, according to Deep Instinct. Additionally, 97% of resp… Continue reading Cybersecurity pros change strategies to combat AI-powered threats

26% of organizations lack any form of IT security training

26% of organizations don’t provide IT security training to end-users, according to Hornetsecurity. The Hornetsecurity survey, which compiled feedback from industry professionals worldwide, also reveals that 8% of organizations offer adaptive trai… Continue reading 26% of organizations lack any form of IT security training

How AI-powered attacks are accelerating the shift to zero trust strategies

In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging … Continue reading How AI-powered attacks are accelerating the shift to zero trust strategies

Businesses must prioritize digital trust to avoid major problems

As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, and regulatory compliance, according to ISACA. The ISACA State of Digital Tr… Continue reading Businesses must prioritize digital trust to avoid major problems

How to combat alert fatigue in cybersecurity

In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in cybersecurity and DevOps environments. Alert fatigue results from the overwhelming volume of event data generated by security too… Continue reading How to combat alert fatigue in cybersecurity

Despite increased budgets, organizations struggle with compliance

Only 40% of organizations feel fully prepared to meet the compliance demands of rising cybersecurity regulations, according to a new Swimlane report. Organizations still feel unprepared for new regulations despite 93% of organizations rethinking their … Continue reading Despite increased budgets, organizations struggle with compliance

Strategies for combating AI-enhanced BEC attacks

In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is AI being leveraged by cybercriminals to enhance the effectiveness of BEC scam… Continue reading Strategies for combating AI-enhanced BEC attacks

Start-Ups: 10 Tips for Navigating the Headwinds Against High-Growth

These strategies can help cybersecurity startups navigate the current market dynamics, focusing on modern buyer behavior, updated KPIs, brand awareness, and effective sales and marketing alignment.
The post Start-Ups: 10 Tips for Navigating the Headwin… Continue reading Start-Ups: 10 Tips for Navigating the Headwinds Against High-Growth

The critical role of IT staffing in strengthening cybersecurity

Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions. It involves the right staff with the unique expertise necessary to recognize and prevent potential t… Continue reading The critical role of IT staffing in strengthening cybersecurity