Victory Winner Free

Be part of a cybersecurity world record attempt

It's Cybersecurity Awareness Month and also Serious Security Week. To mark these events, cybersecurity companies KnowBe4 and OneLogin are partnering with Security Serious in a bid to set a brand new Guinness World Record for the most views of a cyber security lesson video on YouTube in 24 hours.

The record attempt will take place starting today, October 14th at 11am EDT, (8am PDT, 4pm BST) and will see KnowBe4 and OneLogin provide a 45-minute training session that will be live-streamed via YouTube.

By Ian Barker -
cybersecurity

Industry leaders comment on Cybersecurity Awareness Month

Most things have a day or a week or a month nowadays, and as you're reading a tech news site it probably hasn't escaped your attention that October is Cybersecurity Awareness Month.

But just in case you missed it in all of the Windows 11 excitement, here's a round up of what some leading industry figures have to say on cybersecurity, and why we need to be aware of it.

By Ian Barker -
Ripple Water Drop

Cybersecurity 'ripple events' lead to 26x greater losses

A new report by the Cyentia Institute, sponsored by risk management company RiskRecon has analyzed over 800 cyber incidents and their impact on multiple downstream organizations.

It finds that multi-party loss events that impact thousands of downstream organizations, otherwise known as 'ripple events', can result in 26x larger financial losses than traditional single-party incidents.

By Ian Barker -
cyber security

Why every government should have a cybersecurity minister

The world has witnessed the worst kind of cyberattacks that have threatened our personal privacy, stolen private information, and cost billions in lost business and productivity. The past five years have seen increased cyber attacks from home hackers, and with the pandemic, the risk has only increased alongside remote working. The risk of cyberattacks calls for the necessity of establishing proper safety measures, such as by naming a cybersecurity minister for governments to protect the people and organizations.

The only way to secure the internet is for all governments to take a serious approach to cybersecurity. That means establishing a cybersecurity minister in each government to oversee cybersecurity practices in their own country. This is the only way for governments to be confident that every country is up to date on cybersecurity practices.

By Anas Chbib -
Head in hands

Despite the headlines, there's no need to feel hopeless about cybersecurity

The recent Colonial Pipeline attack set off gasoline panic-buying on America’s East Coast and reportedly cost the company $90 million in ransom. An adversarial nation’s Sunburst hack penetrated major U.S. corporations and key government agencies with repercussions yet unknown. Looking at these and other incidents, friends and customers have asked me, "What’s the use? Why bother? If these powerful organizations can be held for ransom or lose key data, what chance does my organization have to defend itself?"

I understand the feelings of helplessness behind the question. It can sometimes seem cybersecurity experts are preaching fire safety while all around us the house is burning down.

By Mark Bell -

Small companies make good targets for cybercriminals

"Cybersecurity doesn’t apply to me because my business is too small to matter", and "Cybercriminals would never bother hacking us because we don’t have valuable data or many financial assets."

If these comments sound familiar, that’s because it is unfortunately the view held by a large majority of the SMB community. Small to medium sized businesses are slowly jumping on the cybersecurity bandwagon, but must first leave this 'it would never happen to me' mentality behind.

By Clive Madders -
Threat intelligence

Why threat intelligence is key to the future of cybersecurity [Q&A]

As threats continue to evolve security vendors must keep up. This means having up to date information and being able to act on it quickly.

The key to this is effective threat intelligence. We spoke to Anuj Goel, co-founder and CEO of Cyware to find out more about threat intelligence and why sharing is key to making the most of it.

By Ian Barker -
machine learning AI

Why AI isn't the only answer to cybersecurity [Q&A]

Read about any new cybersecurity product today and the chances are that it will be keen to stress its use of AI in some form.

But are we expecting too much from AI and are companies adopting it just because it's on trend? We spoke to Nadav Arbel, co-founder and CEO of managed SOC platform CYREBRO, to find out more about AI's role and why the human factor is still important.

By Ian Barker -
workplace stress

51 percent of cybersecurity professionals experience burnout

The challenges of the last year and a half, along with major cyberattacks, like that on Colonial Pipeline, have had a major impact on security professionals, with 51 percent reporting experiencing extreme stress or burnout.

The latest Global Incident Response Threat Report released today by VMware finds 65 percent saying they've considered leaving their job because of stress.

By Ian Barker -
Vacant chair

Cybersecurity skills crisis impacts more than half of organizations

The cybersecurity skills crisis has impacted 57 percent of organizations, according to the fifth annual global study of cybersecurity professionals by the Information Systems Security Association (ISSA) and industry analyst firm Enterprise Strategy Group (ESG).

The survey of almost 500 security professionals finds the top effects of the skills shortage include an increasing workload for the cybersecurity team (62 percent), unfilled open job vacancies (38 percent), and high burnout among staff (38 percent).

By Ian Barker -
Cybersecurity-Threats

Get 'Cybersecurity Threats, Malware Trends, and Strategies' ($22.00 value) FREE for a limited time

After scrutinizing numerous cybersecurity strategies in this book, Tim Rains, Microsoft’s former Global Chief Security Advisor, helps you understand the efficacy of popular cybersecurity strategies and more.

Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.

By Wayne Williams -
Tightrope sharks threat

The most destructive cybersecurity threats in 2021

With companies relying more on technology, such as web applications, third-party solutions, and cloud computing than ever before, corporate cybersecurity has had to become the backbone of modern businesses. In the presence of remote work environments where IoT security has never been more vulnerable, companies need to effectively and quickly adapt to the rapidly evolving methods and techniques that hackers are beginning to employ.

Business vulnerabilities like a weak human firewall could lead to an increased susceptibility to a variety of cybersecurity attacks, such as ransomware and DDOS attacks. But despite all of these challenges, comprehensive and reliable cybersecurity solutions are very much achievable when approached correctly. In order to protect yourself against contemporary security threats, however, one must first understand the threats and risks they are trying to prevent and mitigate.

By Anas Chbib -
Cybersecurity-Fundamentals

Get 'Cybersecurity Fundamentals -- Risks, Procedures, & Integration' ebook for free

The core of the Internet is getting weaker as we connect ever more of our lives -- phones, tablets, cars, refrigerators -- to it. Meanwhile, the attacks are getting stronger.

Cybercrime is a global pandemic. Cybersecurity is mainstream today because we’ve seen the repercussions personally, professionally and financially from not keeping our corporate and customer data secure.

By Wayne Williams -
women in cybersecurity

The changing role of women in cybersecurity

Today's International Women's Day presents an opportunity to look at the role of women in cybersecurity and get the views of some of the leading women in the sector.

As we reported last week women in the cybersecurity industry think that it could take a decade to gain equality.

By Ian Barker -
security eye fingerprint forensics

Digital forensics is the best offense and defense for cyber attacks

The majority of CEOs and COOs view digital forensics as an afterthought to cybersecurity. In the eyes of many business leaders, it is just a clean-up process for a data breach or cyber attack. But if you establish an effective digital forensics and incident response (DFIR) program, you can begin to use digital forensics as a tool for both recovery and prevention.

While cybersecurity and digital forensics work hand-in-hand, their close relationship can often obfuscate their individual objectives. For instance, cybersecurity’s main goal is to reduce an organization’s exposure to cyber attacks while also preventing their success. Cybersecurity has become even more important over the last decade and a half as industry leaders make the transition to digital applications. This is particularly true of the healthcare and automotive industries who have been lacking in their cybersecurity and forensic preparedness.

By Anas Chbib -