Security News

Organizations of all sizes are being targeted by bad actors, which is why cybersecurity awareness training is more important than ever. Unfortunately, most organizations are not motivated to...

Rap sheet spells out major no-nos after disgruntled staff blow whistle The US is suing one of its leading research universities over a litany of alleged failures to meet cybersecurity standards...

Let's be honest. The world of cybersecurity feels like a constant war zone. You're bombarded by threats, scrambling to keep up with patches, and drowning in an endless flood of alerts. It's...

Australia is rapidly embracing renewable energy. But for the nation to successfully leverage renewable energy, it is imperative to establish strong IT foundations.

Explore how low media literacy can have lingering repercussions on Australia’s tech industry.

The CISO will be responsible for leading and managing the organization's information security program, ensuring the protection of data and IT/OT systems across all business units. The CISO will work internally with all business leads and management across the company to develop and implement security practices focused on protecting customer and company assets, and externally, to promote the company's security methodology and framework to customers.

Any regional cultural differences, the particular industry sector, the underlying company structure, the lack of awareness and knowledge of security norms, and conflicting business priorities, can all weigh on any planned change to team culture and security behaviors. Traditionally, the security function has been perceived as the department of "No." Therefore, the primary goal of the security team must be to replace this rules-bound, inflexible, autocratic perception of the security function to one that is open, transparent, positive, creative and collaborative.

Data preparation is a rudimentary and necessary task, but it prevents engineers from focusing their time on the high-value tasks like identifying security gaps or storytelling that will improve the organization's cybersecurity posture. A security data fabric approach helps with transforming raw data into analysis-ready datasets, streamlining data analysis workflows, enabling data quality and integrity, and ultimately facilitating a stronger security posture.

Cyber attacks against higher education institutions increased by 70% in 2023. This is largely due to legacy endpoint security management and practices, limited IT support staff, and overwhelming amounts of data, much of which is PII. In this Help Net Security video, Doug Thompson, Chief Education Architect at Tanium, discusses how higher education institutions can defend against even the most sophisticated threats/vulnerabilities despite limited resources.

Webinar In a world where cyber threats are continually evolving, staying informed is critical for IT and security professionals. Advanced DDoS tactics: Discover the latest trends in Distributed Denial-of-Service attacks, highlighting new strategies and methods.