3 ways enterprises can mitigate social engineering risks

In this Help Net Security video, Alon Levin, VP of Product Management at Seraphic Security, explains what social engineering is, and how prevalent it is. He offers insight into the three ways enterprises can mitigate the risks of social engineering. Pe… Continue reading 3 ways enterprises can mitigate social engineering risks

The gap between security and privacy, and what it will take to bridge it

In this Help Net Security video, Bill Tolson, VP of eDiscovery & Compliance at Archive360, talks about the biggest and perhaps only question in information governance right now: Is enterprise data security good enough to ensure data privacy? An Ar… Continue reading The gap between security and privacy, and what it will take to bridge it

Fine-tuning Germany’s cybersecurity strategy

Recently, Eileen Walther, Northwave’s Country Manager for Germany and specialized in information security, was elected the new Vice President of the Cyber Security Council Germany (Cyber-Sicherheitsrat Deutschland). Before joining Northwave, she was he… Continue reading Fine-tuning Germany’s cybersecurity strategy

7 cybersecurity audiobooks you should listen to this year

Audiobooks have gained enormous popularity among book lovers for a variety of factors, including their convenience, which enables listeners to learn while running errands or traveling. Here’s a list of cybersecurity audiobooks that are worthy of … Continue reading 7 cybersecurity audiobooks you should listen to this year

7 cybersecurity audiobooks you should listen to this year

Audiobooks have gained enormous popularity among book lovers for a variety of factors, including their convenience, which enables listeners to learn while running errands or traveling. Here’s a list of cybersecurity audiobooks that are worthy of … Continue reading 7 cybersecurity audiobooks you should listen to this year

CIS Controls v8: Safeguards to mitigate the most prevalent cyber-attacks

The CIS Critical Security Controls (CIS Controls) are a prioritized set of safeguards to mitigate cyber-attacks against systems and networks. They are mapped to and referenced by multiple legal, regulatory, and policy frameworks. In this Help Net Secur… Continue reading CIS Controls v8: Safeguards to mitigate the most prevalent cyber-attacks

Why digital trust is the bedrock of business relationships

In this Help Net Security video, David Samuelson, CEO at ISACA, talks about how enterprises approach digital trust. While nearly 98% of respondents to an ISACA survey say that digital trust is essential, and 63% say that digital trust is relevant to th… Continue reading Why digital trust is the bedrock of business relationships

The significance of parallel tasks execution for security teams

Infosec teams require nimble security tools to operate in realistic conditions, which may involve thousands of simultaneous events. In this Help Net Security video, Leonid Belkind, CTO at Torq, discusses parallel execution, which enables security opera… Continue reading The significance of parallel tasks execution for security teams

Embedded IoT security threats and challenges

IoT embedded systems combine hardware, firmware, and internet connectivity to carry out particular functions. These devices transfer real-time data via the internet for various purposes, including tracking, monitoring, and analysis. In this Help Net Se… Continue reading Embedded IoT security threats and challenges

Data security trends: 7 statistics you need to know

U.S. businesses are at high risk for data security threats from increasingly effective phishing attempts and the lack of procedures to restrict data access, according to GetApp’s 4th Annual Data Security Report. Newer companies are especially vulnerabl… Continue reading Data security trends: 7 statistics you need to know