Building resilience to shield your digital transformation from cyber threats

Digital transformation projects are top of mind for enterprises. 91% of businesses are currently engaged in some form of digital initiative. Yet, the average cost of a failed, delayed, or scaled-back digital transformation project is more than $4 milli… Continue reading Building resilience to shield your digital transformation from cyber threats

How to withstand the onslaught of cybersecurity threats

“We brought a shovel to fight an avalanche.” That’s the sentiment shared by many business leaders, especially CISOs, CIOs and IT leaders as they face the current cybersecurity threat landscape. Like an avalanche, it’s constantly shifting and changing, … Continue reading How to withstand the onslaught of cybersecurity threats

Russian hackers disrupted Ukrainian electrical grid last year

The notorious Russian hacking group known as Sandworm took down a substation that caused a brief outage, according to a new Mandiant report.

The post Russian hackers disrupted Ukrainian electrical grid last year appeared first on CyberScoop.

Continue reading Russian hackers disrupted Ukrainian electrical grid last year

CISA sees increase in zero-day exploitation, official says

Michael Duffy, associate director for capacity building in CISA’s cybersecurity division, says that global zero-day exploits are “really affecting the federal government networks.”

The post CISA sees increase in zero-day exploitation, official says appeared first on CyberScoop.

Continue reading CISA sees increase in zero-day exploitation, official says

Microsoft upgrades security for signing keys in wake of Chinese breach

Policymakers and researchers have sharply criticized Microsoft’s security practices after an illicitly obtained key enabled a wide-ranging espionage operation. 

The post Microsoft upgrades security for signing keys in wake of Chinese breach appeared first on CyberScoop.

Continue reading Microsoft upgrades security for signing keys in wake of Chinese breach

Vulnerability management metrics: How to measure success

Without the right metrics, vulnerability management is pretty pointless. If you’re not measuring, how do you know it’s working? So how do you know what to focus on? The list is potentially endless, and it can be hard to know what’s really important. In… Continue reading Vulnerability management metrics: How to measure success

Kaspersky reveals ‘elegant’ malware resembling NSA code

The Russian cybersecurity firm discovered sophisticated malware that combined cryptocurrency mining and espionage capabilities.

The post Kaspersky reveals ‘elegant’ malware resembling NSA code appeared first on CyberScoop.

Continue reading Kaspersky reveals ‘elegant’ malware resembling NSA code

Strategies to overcome cybersecurity misconceptions

Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net Security video, Kevin Kirkwood, Deputy CISO at LogRhythm, stresses that one of the … Continue reading Strategies to overcome cybersecurity misconceptions

The real impact of the cybersecurity poverty line on small organizations

The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO at Afni, delves into the realities and myths surrounding the cybersecurity pov… Continue reading The real impact of the cybersecurity poverty line on small organizations