Category Archives: Editor’s Choice

Worldwide spending on security solutions expected to continue growing

Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019, an increase of 9.4% over 2017. This pace of growth is expected to continue for the next several years as industries invest heavily in security solutions to meet a wide range of threats and requirements. $133.8 billion by 2022 Worldwide spending on security solutions will achieve a compound annual growth rate (CAGR) of 9.2% over the 2018-2022 forecast period … More

The post Worldwide spending on security solutions expected to continue growing appeared first on Help Net Security.

You may trust your users, but can you trust their files?

In this Help Net Security podcast recorded at RSA Conference 2019, Aviv Grafi, CEO at Votiro, talks about their Content Disarm and Reconstruction (CDR) technology for protection against cyber threats. Here’s a transcript of the podcast for your convenience. We’re here with Aviv Grafi, CEO of Votiro. Hello, how are you? I’m great. How are you? Great. Can you tell us a little bit about Votiro? Sure. Votiro is a cybersecurity company, we ’re headquartered … More

The post You may trust your users, but can you trust their files? appeared first on Help Net Security.

Breaking the cybersecurity stalemate by investing in people

No surprise, it happened again. In 2018, the financial toll cyber breaches took on organizations hit $3.86 million, a 6.4 percent rise from 2017. Before last year’s close, analysts at Gartner claimed worldwide spending on infosec products and services would increase 12.4 percent, reaching over $114 billion in 2019. In fact, when the U.S. government announced a 2019 budget of $15 billion for cybersecurity-related activities, it came with a 4.1 percent jump and a caveat: … More

The post Breaking the cybersecurity stalemate by investing in people appeared first on Help Net Security.

How the Google and Facebook outages could impact application security

With major outages impacting Gmail, YouTube, Facebook and Instagram recently, consumers are right to be concerned over the security of their private data. While details of these outages haven’t yet been published – a situation I sincerely hope Alphabet and Facebook correct – the implications of these outages are something we should be looking closely at. The first, and most obvious, implication is the impact of data management during outages. Software developers tend to design … More

The post How the Google and Facebook outages could impact application security appeared first on Help Net Security.

A network is only as strong as its weakest shard

Blockchain, a nascent technology, has enterprises globally enamored with the promise it holds to fundamentally turn everything from how we interact, transact, store, and manage data on its head. While the technology’s immutable nature and democratized architecture do have the potential to truly disrupt the world as we know it, there is currently no blockchain capable of truly unlocking the technology’s true potential let alone monetizing it. The reason for this is blockchain continues to … More

The post A network is only as strong as its weakest shard appeared first on Help Net Security.

The art of securing ERP applications: Protecting your critical business processes

In this Help Net Security podcast recorded at RSA Conference 2019, Juan Pablo Perez-Etchegoyen, CTO at Onapsis talks about the challenges of securing and monitoring ERP applications for vulnerabilities and compliance gaps across cloud and on-premise deployments. Juan Pablo leads the research & development team that keeps Onapsis on the cutting-edge of the business-critical application security market. Here’s a transcript of the podcast for your convenience. Hello everyone. Welcome to this Help Net Security podcast. … More

The post The art of securing ERP applications: Protecting your critical business processes appeared first on Help Net Security.

Four key security tips when using any collaboration technology

With database breaches and ransomware attacks making daily news, security is now a top priority for companies, and collaboration solutions are no exception. In the current age of global connectivity, video conferencing and collaboration technologies have become an inescapable part of doing business. Business partners and remote employees around the world rely on these solutions to stay connected and communicate effectively, especially when in-person meetings aren’t possible. While it’s easy enough to say, “my company … More

The post Four key security tips when using any collaboration technology appeared first on Help Net Security.

The modern threat landscape and expanding CISO challenges

Prior to starting Signal Sciences, its founders were running security at Etsy, and growing frustrated with existing legacy technology. So they built their own. For this interview with Andrew Peterson, CEO at Signal Sciences, we dig deep into hot topics such as modern CISO challenges and application security visibility. Prior to co-founding Signal Sciences, Andrew has been building leading edge, highly performing product and sales teams across five continents for +15 years with such companies … More

The post The modern threat landscape and expanding CISO challenges appeared first on Help Net Security.

Latest trends in automated threat intelligence-driven network security

Since the earliest days of the Internet both network threats and network defenses have been evolving. In this Help Net Security podcast recorded at RSA Conference 2019, Todd Weller, Chief Strategy Officer at Bandura Cyber, talks about the latest trends in automated threat intelligence-driven network security. Here’s a transcript of the podcast for your convenience. We’re here with Todd Weller, CSO of Bandura Cyber. How are you Todd? I’m great. Fired up for another RSA … More

The post Latest trends in automated threat intelligence-driven network security appeared first on Help Net Security.

Meet the new generation of white hats

The past two years have seen an explosion in the number of software vulnerabilities being published, jumping from 6,447 in 2016 to 14,714 in 2017. Seeing as 2018 beat out the previous year with 16,521 CVEs reported, we should prepare ourselves for plenty of patching ahead in 2019. While factors like the adoption of automated Application Security Testing (AST) tools by more vendors and the absolute growth of code are definitely playing a bigger role … More

The post Meet the new generation of white hats appeared first on Help Net Security.

Thinking of threat intelligence as a contributing member of your security team

Threat intelligence is widely considered as a significant asset for organizations, but implementation of this intelligence within security operations can often be cumbersome. In this Help Net Security podcast recorded at RSA Conference 2019, Nicholas Hayden, Senior Director of Threat Intelligence at Anomali, talks about the intelligence-driven security operations center. Here’s a transcript of the podcast for your convenience. My name is Nicholas Hayden. I’m the Senior Director of Threat Intelligence for Anomali. Today, on … More

The post Thinking of threat intelligence as a contributing member of your security team appeared first on Help Net Security.

The quantum sea change: Navigating the impacts for cryptography

Professionals in cybersecurity and cryptography (and even non-IT executives) are hearing about the coming threat from quantum computing. It’s reaching the mainstream business consciousness. A December 2018 report from Deloitte notes “It is expected that 2019 or 2020 will see the first-ever proven example of quantum supremacy, sometimes known as quantum superiority: a case where a quantum computer will be able to perform a certain task that no classical (traditional transistor-based digital) computer can solve … More

The post The quantum sea change: Navigating the impacts for cryptography appeared first on Help Net Security.