IT News - Security
2022 Sep 18
7 Free Online Cybersecurity Courses You Can Take Right Now
Help Net Security, September 6th, 2022

The skills gap can be addressed through training and certifications to increase employees' education.

The talent shortage and a variety of specialized fields within cybersecurity have inspired many to reskill and join the industry. One way to get more knowledge is to take advantage of online learning opportunities. Below you can find a list of free online cybersecurity courses that can help further your career.
(Get More Information . .)

2022 Sep 18
Your Vendors Are Likely Your Biggest Cybersecurity Risk
Help Net Security, September 4th, 2022

With organizations expanding their vendor base, there is a critical need for holistic third-party risk management (TPRM) and comprehensive cybersecurity measures to assess how much risk vendors pose.

While organizations assess and manage risk on a multitude of layers, none present bigger threats to business resiliency than third-party risk and a lack of robust cybersecurity controls. Breaches and service interruptions tied to these risk areas have brought down critical systems of major organizations. In 2021, 53% of CISOs surveyed by Black Kite reported being hit by at least one ransomware attack.
(Get More Information . .)

2022 Sep 18
GDPR: Four Years After Its Enactment, Where Do We Stand?
Cyber Defense Magazine, September 4th, 2022

Needless to say, data privacy is a complex issue for most organizations, and it has been made even more complicated by legislation such as GDPR. Four years later, GDPR compliance is something that many organizations continue to struggle with for a variety of reasons. In fact, just looking at the GDPR enforcement tracker, we continue to see related fines and penalties - ranging from a few thousand to hundreds of millions of dollars - being issued on a weekly basis.

So, where do we stand now that a few years have passed since GDPR went into effect? Let's explore.
(Get More Information . .)

2022 Sep 18
5 Decisions To Make Now For A Successful Cyberattack Incident Response
Technative, September 4th, 2022

When the fortress comes under siege, the soldiers descend into chaos in moments. It doesn't matter that they have better technology or that they know how to use it. Without leadership, they cannot mount an effective response.

Experiencing a cyberattack is an immensely stressful experience, ripe for disorganization. And although having a technical response plan is all well and good, many businesses fail to account for something equally critical. When their business is under fire, who's responsible for pulling the trigger on response and remediation efforts?
(Get More Information . .)

2022 Sep 18
Zero Trust Security : A New Perspective On Cybersecurity
Security Boulevard, September 6th, 2022

According to Cybersecurity Ventures, global cybercrime costs will increase by 15% per year over the next five years, reaching USD 10.5 trillion annually by 2025, up from USD 3 trillion in 2015.No wonder why the need for top-notch cybersecurity is increasing on a day-to-day basis.

The trust in outside or inside networks requesting access has gone low to ZERO. And voila, John Kindervag heard us, back in 2010 and coined the term 'zero trust,' which centers on the notion that an organization shouldn't trust anything inside or outside its boundaries.
(Get More Information . .)

2022 Sep 18
The Best 23 Data Security Platforms To Consider In 2022
Solutions Review, September 7th, 2022

Data security, according to IBM, is the practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle. It's a concept that encompasses every aspect of information security, from the physical security of hardware and storage devices to administrative and access controls, as well as the logical security of software applications. It also includes organizational policies and procedures.

Most IAM and SIEM platforms will offer some level of data protection, but because it's not the primary focus, there will still remain gaps in your data security. Especially dangerous for enterprises handling big data. As the technology to protect data develops and becomes more refined and defined, this list will potentially see continuous updates. As it stands, these are the vendors leading the way in data security.
(Get More Information . .)

See all archived IT News - Security articles See all articles from this issue