Why CISOs need to build cyber fault tolerance into their business

CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to outdated zero tolerance for failure mindsets, according to Gartner. “Each new cybersecurity disruption exposes the fact that CISO… Continue reading Why CISOs need to build cyber fault tolerance into their business

US retailers under attack by gift card-thieving cyber gang

Earlier this month, the FBI published a private industry notification about Storm-0539 (aka Atlas Lion), a Morocco-based cyber criminal group that specializes in compromising retailers and creating fraudulent gift cards. Microsoft then went more in-dep… Continue reading US retailers under attack by gift card-thieving cyber gang

US exposes scheme enabling North Korean IT workers to bypass sanctions

The US Justice Department had unsealed charges against a US woman and an Ukranian man who, along with three unidentified foreign nationals, have allegedly helped North Korean IT workers work remotely for US companies under assumed US identities and thu… Continue reading US exposes scheme enabling North Korean IT workers to bypass sanctions

How a GRC consultant passed the CISSP exam in six weeks

Ask any IT security professional which certification they would consider to be the “gold standard” in terms of prestige, credibility, or difficulty, and almost invariably they will answer: the CISSP. If an organization is seeking some peace regarding i… Continue reading How a GRC consultant passed the CISSP exam in six weeks

Are you meeting your cyber insurance requirements?

Cyber insurance policies are specifically designed to offer financial protection to organizations in the face of cyber attacks, data breaches, or other cybersecurity incidents. While they can provide a sense of security, it’s crucial to be aware … Continue reading Are you meeting your cyber insurance requirements?

6 tips to implement security gamification effectively

There’s not a CISO in the industry who’s not aware of the extremely short median CISO tenure. That’s why the best CISOs are those who constantly seek ways to strengthen their teams. They help members evolve and grow in their roles, enhancing security p… Continue reading 6 tips to implement security gamification effectively

How to prepare for the CISSP exam: Tips from industry leaders

The Certified Information Systems Security Professional (CISSP) is the most widely recognized certification in the information security industry. CISSP certifies that an information security professional possesses extensive technical and managerial exp… Continue reading How to prepare for the CISSP exam: Tips from industry leaders

Building a strong cloud security posture

In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many leaders are unaware that they need to secure the cloud the same way they woul… Continue reading Building a strong cloud security posture

What is multi-factor authentication (MFA), and why is it important?

Setting up MFA can seem daunting for consumers just beginning to clean up their security postures. In this Help Net Security video, Larry Kinkaid, Manager, Cybersecurity Consulting at BARR Advisory, shares tips for consumers who need simple, accessible… Continue reading What is multi-factor authentication (MFA), and why is it important?