Features

data analytics - statistical analysis - charts, graphs, strategy planning

SOC analyst job description, salary, and certification

A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

10 markers of a great cybersecurity program

How strong is your security program? These ten indicators will help you recognize greatness in your own organization and serve as a guide for what to look for in a partner.

successful team collaboration shows happy employees celebrating and giving each other high fives

How Prudential measures its security culture to identify risk

The financial services firm finds that employee confidence in how they would respond to a given security scenario is a better indicator of risk than their security knowledge.

Security system alert, warning of a cyberattack.

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources.

Global geopolitical vectors

How CISOs can best assess geopolitical risk factors

A recent report on Russian-affiliated advanced persistent threats provides a template to help CISOs evaluate risk from nation-state actors.

disaster preparedness  >  checklist / batteries / tools / first aid kit / matches / water / radio

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.

tech spotlight collaboration ctw intro by  ipopba 887088424 3x2 2400x1600

Collaboration answers the call

When office workers fled to their homes, collaboration tools and methods suddenly became indispensable. Here's what our new era of collaboration may look like.

tech spotlight collaboration ctw by fotogestoeber gettyimages 1071228974 3x2 2400x1600

Remote working, now and forevermore?

Employees around the world are suddenly working from home full-time. Find out how to make this new reality work for your organization, whether it will last beyond the pandemic, and where it might take us.

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

AI-powered deception technology speeds deployment, improves results

Aflac says artificial intelligence made its honeypot rollout faster and less complicated, and produces high-quality alerts. A healthcare facility rolls out deception technology for protection during the COVID crisis.

tech spotlight collaboration cso by peshkov gettyimages 1209349082 3x2 2400x1600

8 key security considerations for protecting remote workers

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas.

Scanning for vulnerabilities.

What are vulnerability scanners and how do they work?

Vulnerability scanners are automated tools that allow organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks.

podcast image template

Podcast: What is a deepfake? How to prepare for and respond to this cyber attack

As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern...

Security administration  >  A shield protects a network of users and systems.

Microsoft Threat Protection: What security and IT admins need to know

Microsoft Threat Protection can protect Windows systems and Office 365 users on many levels, but licensing requirements can be confusing.

A military meeting with civilians.

The Cybersecurity Maturity Model Certification explained: What defense contractors need to know

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across the defense industrial base, which includes over 300,000 companies in the supply chain.

podcast image template

Podcast: Why new remote work policies attract hackers

With widespread mandated work from home policies due to the coronavirus, many employees are working remotely for the first time. In some cases, employers had never intended their employees to be remote-only, and they may lack key work...

FinTech / electronic payments / banking / dollars / euros / pounds / yen

7 PSD2 questions every CISO should be prepared to answer

The EU's recently updated Payment Services Directive has several requirements that affect security, such as stronger authentication for online payments.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Gourav Mukherjee, managing partner, Immersion Security

How one healthcare CISO is navigating the COVID-19 crisis

Security is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.

Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

Money flows through a tunnel of binary code as a target hovers over a code bug.

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.

Load More