Security Practices

Security Practices | News, how-tos, features, reviews, and videos

joe sullivan
digital trust fintech online payment shutterstock 2194218929

Unexpected obstacles/disaster preparedness > A toy knight defends against a descending sneaker

Accenture, IBM, Mandiant join Elite Cyber Defenders Program to secure critical infrastructure

Led by Nozomi Networks, the program aims to provide global industrial and government customers cybersecurity defense tools, incident response teams, and threat intelligence.

military veteran cybersecurity

The classified document leak: let’s talk about Jack Teixeira’s need-to-know

The release of classified documents by a US Air National Guardsman highlights how important it is for CISOs to consider who should have access to sensitive data and why.

office screen workers cybersecurity reporting concern

Why reporting an incident only makes the cybersecurity community stronger

CISOs and cyber leaders may not see reporting a breach as the most pleasant of tasks, but experts say mandatory and voluntary sharing of intelligence around incidents can only improve the readiness and resilience of responders.

cybercrime cyber crime skull symbol project darknet dark web internet safety cyberattack theft viru

New Rorschach ransomware hits with unique features and very fast encryption

Researchers say the recently discovered strain raises the bar by automating some intrusion processes and moving very quickly compared to other attacks.

Ukraine flag

Views of a hot cyberwar — the Ukrainian perspective on Russia’s online assault

A report from Ukraine’s cybersecurity service reveals insight into what the country has been facing from belligerent attackers and holds a lesson for CISOs.

ai in retail 1000x630

5 cyber threats retailers are facing — and how they’re fighting back

Ransomware, point-of-sale hacks, and supply chain threats are just a few of the worries for today’s retailers. The stakes are high when you’re handling big money and reams of consumer data.

tiktok logo small

UK bans TikTok on government devices over data security fears

The UK has joined international partners in banning social media app TikTok from government electronic devices over concerns the Chinese-owned app could pose a security risk.


Dell beefs up security portfolio with new threat detection and recovery tools

Dell Technologies has added improved MDR capabilities, cloud-based component verification, and a new cyber recovery solution along with a partnered threat management offering.

dissatisfied customer experience concept unhappy business customer with sad face bad review bad ser

Best and worst data breach responses highlight the do's and don'ts of IR

There are right ways and wrong ways to deal with a cyberattack. Here’s a look back at some of the most egregious and laudable responses by security teams in recent memory.

Closeup on stressed business woman with eyeglasses -- tension headache burnout

Evolving cyberattacks, alert fatigue creating DFIR burnout, regulatory risk

Digital forensics and incident response teams face increasing workloads amid evolving cyberattacks, recruiting and hiring challenges, and a lack of effective automation.

2173441025 comms communication miscommunication

Plan now to avoid a communications failure after a cyberattack

CISOs should take the lead to develop a post-cyberattack communications plan that accurately informs stakeholders and instills confidence in their organizations' response.

cyber attack alarm alert

Will your incident response team fight or freeze when a cyberattack hits?

CISOs train their teams to fight hackers but often overlook the human tendency to freeze up during a crisis. Planning for the psychology of incident response can help prevent a team from seizing up at the wrong moment.

security vulnerabilities such as hackers and cyberattacks

ServiceNow to detect open source security vulnerabilities with Snyk integration

ServiceNow Vulnerability Response users will now have access to Snyk’s product that scans open source code during the development process.

Social media threats / risks / dangers / headaches  >  Text bubbles bearing danger signs

Social media use can put companies at risk: Here are some ways to mitigate the danger

Using social media can expose company and employee data, and misuse could harm organizational reputation. Here are some tips that can help reduce the risk.

noops code developer devops html web developer by mazimusnd getty

MTTR “not a viable metric” for complex software system reliability and security

Verica Open Incident Database Report suggests mean time to resolve should be retired and replaced with other metrics more appropriate for software systems and networks.

blame 174280704

When blaming the user for a security breach is unfair – or just wrong

Training non-tech savvy users to recognize phishing and other credential-based attacks is essential but expecting employees to man the front lines against intrusions is a mistake, experts say. Harmony between staff psychology and...

European Union, EU

EU Council adopts NIS2 directive to harmonize cybersecurity across member states

The NIS2 directive replaces NIS as EU Council seeks to improve resilience and incident response capacities in the EU.

analytics mistrust 2

Almost half of customers have left a vendor due to poor digital trust: Report

New research from DigiCert has found that digital trust is a key driver of customer loyalty, with 84% of customers saying they would consider leaving a vendor that did not manage digital trust.

Load More
You Might Also Like