Security News

Best practices for Kubernetes security in the enterprise market
2022-09-02 04:30

As part of digital transformation, more and more organizations are transforming their application using cloud native architecture to become more agile and accelerate time to market. They are increasingly adopting containers and Kubernetes to do so.

Cisco Recognized for 2021 Market Leadership Global Network Firewall Industry Excellence in Best Practices
2022-07-29 00:00

Network firewalls are a critical line of defense in securing enterprise networks and protecting their vital data. The rapid transition to cloud infrastructure makes managing networks quite complex and cumbersome, leaving security and information technology teams with the overwhelming task of determining proper restrictions and access.

Best practices for cyber resilience
2022-07-13 03:00

Cyber resilience is a top priority for global organizations. Understanding threats plays a key role in building and maintaining a strong layered security approach, according to IDC. In this Help Net Security video, Robin Berthier, CEO at Network Perception, talks about strategy for cyber resilience.

Most organizations do not follow data backup best practices
2022-05-26 03:30

Apricorn announced new findings from a survey, which revealed that while the majority organizations have data backup plans in place, data for many are at risk. Nearly 400 veteran IT security practitioners were surveyed, in industries such as healthcare, IT, education, financial services and manufacturing about security practices around remote and hybrid work, focusing on data resiliency-the availability to access and resuscitate corporate data in the event of a ransomware occurrence or other cybersecurity attack.

Best practices for healthcare delivery organizations to manage supply chain cybersecurity risks
2022-05-17 03:00

Drafted by the Health Information Management Working Group, the report provides best practices that healthcare delivery organizations can use to manage the cybersecurity risks associated with their supply chains. HDOs face risks from many different types of supply chain vendors, everything from food suppliers, software providers, medical devices, pharmaceuticals, and day-to-day medical supplies.

10 best practices to reduce the probability of a material breach
2022-05-12 03:00

ThoughtLab announced the findings of its 2022 cybersecurity benchmarking study which analyzed the cybersecurity strategies and results of 1,200 large organizations across 14 different sectors and 16 countries, representing $125.2 billion of annual cybersecurity spending. The number of material breaches respondents suffered rose 20.5% from 2020 to 2021, and cybersecurity budgets as a percentage of firms' total revenue jumped 51%, from 0.53% to 0.80%. During that time, cybersecurity became a strategic business imperative, requiring CEOs and their management teams to work together to meet the higher expectations of regulators, shareholders, and the board.

Best Practices for Managing the Three Levels of AWS Security
2022-04-06 00:00

The nature of the expanding attack surface and advanced threats necessitates broader, more comprehensive protection. Security architects tasked with designing, implementing, and maintaining security for AWS environments should look for comprehensive solutions that deliver multilayer protections which augment native AWS tools.

Best Practices for Managing the 3 Levels of AWS Security
2022-04-06 00:00

The nature of the expanding attack surface and advanced threats necessitates broader, more comprehensive protection. Security architects tasked with designing, implementing, and maintaining security for AWS environments should look for comprehensive solutions that deliver multilayer protections which augment native AWS tools.

Best Practices for Managing the 3 Levels of AWS Security
2022-04-06 00:00

The nature of the expanding attack surface and advanced threats necessitates broader, more comprehensive protection. Security architects tasked with designing, implementing, and maintaining security for AWS environments should look for comprehensive solutions that deliver multilayer protections which augment native AWS tools.

Cybersecurity compliance: Start with proven best practices
2022-03-23 05:30

Another reason to start with the CIS Controls? They work. Want to track your implementation of the Controls and your compliance with those mapped frameworks? The CIS Controls Self Assessment Tool, available exclusively to CIS SecureSuite Members, can help with that.