Recognizing that the weak link in most security chains is human beings, the InfoSec Instituteannounced a new certification for security awareness practitioners. The Certified Security Awareness Practitioner (CSAP) boot camp is an intensive
Businesses are falling behind on their cyber hygiene. Security firm Tripwire has released its State of Cyber Hygiene Report detailing how organisations fall behind on basic cybersecurity practices. In its report, Tripwire
The post Over 60 percent of organisations fail to follow basic security benchmarks appeared first on The Cyber Security Place.
The breach apparently occurred from March 2017 to mid-July of 2018. Credit card issuer TCM Bank, which works with some 750 small and community U.S. financial institutions, including credit unions, exposed
Multiple vulnerabilities in a popular healthcare software provider’s products may have put at risk the data of over 90 million patients. OpenEMR develops open source electronic health record (EHR) and
The post Over 20 Flaws Discovered in Popular Healthcare Software appeared first on The Cyber Security Place.
The following strategies are significant shifts you can use to improve your data security. They’ll take time and resources to implement. However, they all contribute to significantly better cybersecurity in
The post Four Long-Term Strategies To Improve Your Company’s Data Security appeared first on The Cyber Security Place.
In today’s digital world there are nearly 23.14 billion connected devices. Employees across the globe are using these devices to do everything from check personal and corporate emails to access corporate
The post The Two-Step Process to Fix the Internet’s Identity Problem appeared first on The Cyber Security Place.
The government is relying on a “skeleton staff” of security analysts to root out and respond to online threats, according to a new FoI request. SIEM specialist Huntsman Security wanted to find
The post Government Security Analysts Submerged with Threats appeared first on The Cyber Security Place.
Is your organisation prepared to handle and secure data across a diverse range of device types? Data security practices that disrupt workflow place an undue burden on users and administrators.
The post Three essential pillars of transparent data security appeared first on The Cyber Security Place.
Should a CISO carry the can if a business suffers damage from a hacking attack? This question must sit in the back of the average CISO’s mind more and more
The post Breach Accountability: Blaming the CISO vs An End to Shaming appeared first on The Cyber Security Place.
Security is a global problem, so it makes sense that we look beyond our own borders for a solution. One source of inspiration in its approach to security is the Australian
The post Should We be Looking Down Under to Improve Our Security? appeared first on The Cyber Security Place.
A little bit of self-awareness goes a long way when it comes to evaluating a company’s security maturity level. It’s also a prerequisite to improving. Recently, I observed a somewhat
The post How ‘Projection’ Slows Down the Path to Security Maturity appeared first on The Cyber Security Place.
Phishing has long posed a threat to businesses thanks to attackers who convince users to open harmful email attachments and executable links. As a result, companies have strengthened malware blocking
The post Phishing in the Deep End: The Growing Threat of Attacks Beyond Email appeared first on The Cyber Security Place.
In an effort to address the growing skills gap in the cybersecurity industry, a team of former Royal Marines Commandos have launched a business providing free cybersecurity training, accredited qualifications