How to prepare for the CISSP exam: Tips from industry leaders

The Certified Information Systems Security Professional (CISSP) is the most widely recognized certification in the information security industry. CISSP certifies that an information security professional possesses extensive technical and managerial exp… Continue reading How to prepare for the CISSP exam: Tips from industry leaders

Most companies changed their cybersecurity strategy in the past year

Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past year, according to LogRhythm. Strategic shifts within organizations At the heart … Continue reading Most companies changed their cybersecurity strategy in the past year

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element

The exploitation of vulnerabilities as an initial point of entry almost tripled from the previous year, accounting for 14% of all breaches, according to Verizon’s 2024 Data Breach Investigations Report, which analyzed a record-high 30,458 securit… Continue reading 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element

Making cybersecurity more appealing to women, closing the skills gap

In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis emphasizes the need for proactive strategies to attract diverse talent, impro… Continue reading Making cybersecurity more appealing to women, closing the skills gap

Building a strong cloud security posture

In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many leaders are unaware that they need to secure the cloud the same way they woul… Continue reading Building a strong cloud security posture

Essential steps for zero-trust strategy implementation

63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, this investment represents less than 25% of the overall cybersecurity budget. A… Continue reading Essential steps for zero-trust strategy implementation

Security analysts believe more than half of tasks could be automated

Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI expected to boost threat detection In fact, security analysts maintain that up to … Continue reading Security analysts believe more than half of tasks could be automated

The relationship between cybersecurity and work tech innovation

As organizations navigate the complexities of hybrid work arrangements and the gradual return to the office, the cybersecurity threat landscape has become increasingly challenging, with issues such as the proliferation of personal devices, the expansio… Continue reading The relationship between cybersecurity and work tech innovation

How to optimize your bug bounty programs

In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role bug bounty programs play in identifying security vulnerabilities and facilitating collaboration with researchers. He … Continue reading How to optimize your bug bounty programs

How to improve response to emerging cybersecurity threats

Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos featu… Continue reading How to improve response to emerging cybersecurity threats