15 Hot Tools To Come Out of Black Hat and Def Con

|
Security summer camp is upon us as the cybersecurity industry convenes on Las Vegas this week for Black Hat and Def Con. In addition to presenting a ton of important research on new vulnerabilities and exploit methods, many security researchers will be sharing with attendees a smorgasbord of new and ... Read More

Most CISOs Believe Companies Stake Their Reputations on Cybersecurity Budgets, Survey Shows

|
Nine in 10 IT security professionals say their companies can improve their reputations by better protecting data, according to a Bitdefender survey. CISOs and their teams also admit a weak posture could have the opposite effect, as seen in countless headlines in recent years that have sullied corporate images following ... Read More

Level of Cyber Risk to Businesses Held Steady in First Quarter According to Report

|
Cyber security executives and teams—and for that matter organizations as a whole—could certainly use some good news when it comes to risk assessment, and perhaps a recent report provides just that ... Read More

Even with the Greater Emphasis on Cyber Security, Many Organizations Still Struggle to Protect Themselves

|
With all the recent emphasis on cyber security and the seemingly endless reports about how the focus on prioritizing data protection has risen to the board and C-suite levels, many organizations apparently are still struggling to defend themselves properly against the growing array of attacks ... Read More

Cyber Attacks Remain a High Risk, and More Enterprises are Buying Insurance for Protection

|
The Society of Actuaries (SOA), the world's largest actuarial professional organization, recently released its annual survey of emerging risks in conjunction with other partner organizations. The good news for security programs is that cyber risk for the first time in five years was not ranked at the top of the ... Read More

The Great Cyber Security Talent Shortage Continues

|
We’ve been hearing a lot about the cyber security skills shortage for several years now, and a recent study documents just how severe the shortage is and the impact it is having on many organizations ... Read More

What Role Will Blockchain Have in Cyber Security and Risk Management?

|
Could blockchain play a major role in cyber security and risk management efforts at organizations? The jury is still out. But it’s clear that blockchain—defined as a “single version of the truth” made possible by an immutable and secure time-stamped ledger—continues to garner interest among businesses in a variety of ... Read More

Identity and Access Management on the Rise as Environments Grow in Complexity

|
One of the biggest concerns and challenges in cyber security is knowing who has access to which data and applications within an enterprise at any given time. This has become all the more complex for IT and security management with the growth in cloud services and the increased use of ... Read More

Successful Convergence of IT and Operational Technology will be Vital for Strong Cyber Security

|
The Internet of Things (IoT) and Industrial IoT represent a massive new cyber security challenge for many organizations, vastly expanding the potential attack surface because of the greatly increased number of end point devices in use ... Read More

Addressing the Human Error Causes of Security Breaches

|
Cyber security breaches can come from a wide variety of sources: Hackers out to exploit vulnerabilities and make money or wreak havoc; nation states looking to gain an economic advantage; competitors aiming to steal intellectual property; and disgruntled employees plotting to cause damage at their companies—to name a few ... Read More