US government puts cybersecurity at forefront with newly announced National Strategy

The National Cybersecurity Strategy was unveiled today by the Biden-Harris Administration. The Strategy recognizes that government must use all tools of national power in a coordinated manner to protect national security, public safety, and economic pr… Continue reading US government puts cybersecurity at forefront with newly announced National Strategy

Uncovering the most pressing cybersecurity concerns for SMBs

In this Help Net Security video interview, James Edgar, CISO at Fleetcor, discusses what consequences SMBs are most concerned about when it comes to cyberattacks, what technology SMBs are most interested in, and much more.
The post Uncovering the most … Continue reading Uncovering the most pressing cybersecurity concerns for SMBs

Developers can make a great extension of your security team

Developers care about the quality and security of their code, and when empowered to help, developers make great security advocates who can help harden your supply chain security while reducing the burden on DevOps and security teams. Introducing securi… Continue reading Developers can make a great extension of your security team

A modern-day look at AppSec testing tools

In this Help Net Security video, Frank Catucci, CTO, and Dan Murphy, Distinguished Architect at Invicti Security, break down the different types of application security testing tools, explore the strengths and tradeoffs, and provide you with the inform… Continue reading A modern-day look at AppSec testing tools

It only takes one over-privileged identity to do major damage to a cloud

While moving to the cloud increases efficiency and business agility, security strategies haven’t been adapted to account for this shift and traditional tools can’t effectively manage the unique associated risks. CISOs that ignore the risks are left com… Continue reading It only takes one over-privileged identity to do major damage to a cloud

Expert strategies for defending against multilingual email-based attacks

BEC (Business Email Compromise) attacks have become increasingly prevalent in recent years, with cybercriminals using a variety of tactics to gain access to sensitive information and steal money from businesses. While many people may assume that these … Continue reading Expert strategies for defending against multilingual email-based attacks

Foiling intellectual property theft in a digital-first world

In today’s data-driven world, the expectations and demands faced by many organizations worldwide are reaching unseen levels. To meet the challenge, a data-driven approach is necessary, with effective digital transformation needed to improve operational… Continue reading Foiling intellectual property theft in a digital-first world

Stay one step ahead: Cybersecurity best practices to prevent breaches

In this Help Net Security video, Caroline Wong, Chief Strategy Officer at Cobalt, offers valuable insight into what leaders can do to instill stronger cybersecurity practices from the bottom up and prevent breaches.
The post Stay one step ahead: Cybers… Continue reading Stay one step ahead: Cybersecurity best practices to prevent breaches

Employees bypass cybersecurity guidance to achieve business objectives

By 2025, nearly half of cybersecurity leaders will change jobs, 25% for different roles entirely due to multiple work-related stressors, according to Gartner. “Cybersecurity professionals are facing unsustainable levels of stress,” said Deepti Gopal, D… Continue reading Employees bypass cybersecurity guidance to achieve business objectives

How a hub and spoke model can future-proof your cloud deployment

Cloud adoption among organizations has increased dramatically over the past few years, both in the range of services used and the extent to which they are employed, according to Info-Tech Research Group. However, network builders tend to overlook the v… Continue reading How a hub and spoke model can future-proof your cloud deployment