Balancing risk and security tradeoffs

In this Help Net Security video, Christopher Hodson, CSO at Cyberhaven, talks about how CISOs have been investing in inflating their tech stack, but for what? No amount of acronyms will do any good if stuff is leaking from within. Classifying files and data would enable companies to understand what data is necessary and focus […]

Continue Reading

How to scale cybersecurity for your business

All businesses seek profitable growth. The issue is that growth adds complexity. Organizations need new systems and more employees to support this larger footprint, thus expanding the number of potential points of failure. This means more financial and reputation risks going forward – especially as organizations grow their digital presence. To balance out these unintended […]

Continue Reading

The next cyber threat may come from within

71% of business executives worry about accidental internal staff error as one of the top threats facing their companies, almost on par with concern about outside attackers (75%), according to EisnerAmper. An additional 23% said they worry about malicious intent by an employee. Internal cyber defense The survey found somewhat muted faith in current safety […]

Continue Reading

50% of organizations have indirect relationships with 200+ breached fourth-party vendors

98 percent of organizations have vendor relationships with at least one third-party that has experienced a breach in the last two years, according to SecurityScorecard and The Cyentia Institute. The study also found that 50 percent of organizations have indirect relationships with at least 200 breached fourth-party vendors in the last two years. “An organizations’ […]

Continue Reading

The future of vulnerability management and patch compliance

IT departments continue to face immense pressure to get vulnerability and patch management right as threat actors use new and old methods to exploit network endpoints. But are we ready for what’s next? As vulnerabilities continue to increase, what strategies should security professionals use to gain visibility into these threats, prioritize them, and manage the […]

Continue Reading

3 ways to stop cybersecurity concerns from hindering utility infrastructure modernization efforts

Utility infrastructure is in dire need of modernization. In many parts of the world, the infrastructure delivering power and water to consumers is not ready to withstand natural disasters and rising energy demands. Integrating real-time data analytics into the decision-making process is one way to kick start modernization efforts, yet nearly one in five utilities […]

Continue Reading

DigiCert releases new unified approach to trust management

New solution brings together full stack of CA-agnostic certificate lifecycle management, PKI services and tightly integrated public trust issuance. We rarely consciously think about the fact that, in this Information Age, many aspects of our private and work lives are only possible because of digital trust that has been built throughout decades. We also usually […]

Continue Reading