How airlines can embrace IT system modernization

Recent travel meltdowns at Southwest Airlines and the FAA have exposed our dependence on fragile, outdated, or unreliable computer systems. Institutional failures have made updating airline technology even more challenging, with some legacy systems dat… Continue reading How airlines can embrace IT system modernization

Leveraging network automation to enhance network security

Data backups get a lot of attention, but sadly, sometimes, the operational work that keeps networks secure – like device backups, upgrades, and configuration grooming – goes undone. Recent high-profile network outages have brought attention to the impo… Continue reading Leveraging network automation to enhance network security

Scan and diagnose your SME’s cybersecurity with expert recommendations from ENISA

The release of a cybersecurity maturity assessment tool by the European Union Agency for Cybersecurity (ENISA) aims to provide Small and Medium Enterprises (SMEs) with a valuable resource for enhancing their security posture. As a significant driver fo… Continue reading Scan and diagnose your SME’s cybersecurity with expert recommendations from ENISA

How cybersecurity decision-makers perceive cyber resilience

In an economic climate putting immense pressure on business leaders to prove ROI and team efficiency – a new report from Immersive Labs looks into the lack of confidence cyber leaders have in their team’s preparation and abilities to combat cyber… Continue reading How cybersecurity decision-makers perceive cyber resilience

What the food and building industry can teach us about securing embedded systems

As one of the leading experts in product security with over 15 years of experience in security engineering and 120 cybersecurity patents under his belt, Adam Boulton is one of the most experienced software security professionals in the industry. Curren… Continue reading What the food and building industry can teach us about securing embedded systems

Prioritizing data security amid workforce disruptions

Businesses have faced massive disruptions in their workforce – many are requesting employees return to the office, and layoffs are rattling several industries. This disruption in the workforce can open organizations up to significant security breaches…. Continue reading Prioritizing data security amid workforce disruptions

Why organizations shouldn’t fold to cybercriminal requests

Organizations worldwide pay ransomware fees instead of implementing solutions to protect themselves. The ransom is just the tip of the iceberg regarding the damage a ransomware attack can wreak. In this Help Net Security video, Gerasim Hovhannisyan, CE… Continue reading Why organizations shouldn’t fold to cybercriminal requests

Best practices to secure digital identities

With cybersecurity incidents involving compromised credentials continually the most common cause of a data breach for enterprises – and account takeover for individuals, securing digital identities has become paramount. In this Help Net Security video,… Continue reading Best practices to secure digital identities

Enhance security while lowering IT overhead in times of recession

“Is cybersecurity recession-proof?” That’s the question on the minds of many security professionals and executives as a possible economic downturn of indeterminate length and severity looms and many organizations are tightening their belts. While resea… Continue reading Enhance security while lowering IT overhead in times of recession

Why you should treat ChatGPT like any other vendor service

Although OpenAI is an established organization with many years of experience promoting and developing AI systems, the relative immaturity of the ChatGPT application, combined with the lack of security assurance available for OpenAI, can put organizatio… Continue reading Why you should treat ChatGPT like any other vendor service