Category Archives: Follow on

Connecting the dots to North Korea as a threat adversary

Reports of malware campaigns invariably focus on two critical conclusions: attribution and who was the intended target of the attack. It is challenging to draw swift conclusions on the former, due to the use of false flags designed to divert attention from the true source of the attack. Those swift conclusions are modified as more information becomes available, and it is much later before we achieve transparency on the campaign. Whilst this is a challenge … More

The post Connecting the dots to North Korea as a threat adversary appeared first on Help Net Security.

Three A’s of SaaS adoption, and why every company goes through them

I’ve noticed that as more and more companies turn to SaaS applications to power their business, they all experience the same journey along the way, more or less. Everyone goes through what I call “the 3 A’s of SaaS adoption”: aggravation, acceptance, and adoption. Companies go through distinct stages of SaaS adoption. As your SaaS environment matures, needs shift and challenges evolve. But if you know what to expect at each stage and what’s coming … More

The post Three A’s of SaaS adoption, and why every company goes through them appeared first on Help Net Security.

The security issues 3D printing should solve before going mainstream

It’s always fun when you can mix your personal hobbies and interests with your profession, and often the passion you carry for the things you love can lead to valuable and productive insights for your vocation as well. Let’s hope that theory proves true as this 20-year information security professional, and recent 3D printing enthusiast, considers the potential cybersecurity risks with additive manufacturing. If I threw you for a second there with my “fancy words,” … More

The post The security issues 3D printing should solve before going mainstream appeared first on Help Net Security.

Securely deploying automation for business benefit

Streamlining business processes – and cutting down on the need for human employees to perform mundane and repetitive tasks – automation technology is increasingly being employed by organisations around the world. As part of their digital transformation initiatives, in which businesses seek to improve their efficiency, automation represents an opportunity to boost productivity while significantly reducing the risk of human error. The platforms and tools needed to automate an organisation’s business processes often require access … More

The post Securely deploying automation for business benefit appeared first on Help Net Security.

How SOAR can increase the value of your security team

Over the past few years, the cybersecurity industry has rapidly transformed. The exploding number and growing complexity of cyberattacks has forced organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with increasingly sophisticated threats and rising threat levels. However, for many companies, recent research from ESG shows that cybersecurity represents the most significant area where organizations have a troublesome shortage of skills and tools as 51 percent claimed … More

The post How SOAR can increase the value of your security team appeared first on Help Net Security.

Dealing with a system launch: It requires more than just testing

Rolling out new IT systems or software can be a challenge and fraught with issues from day one – and the recent IT crisis with TSB has shown how damaging these can be if managed poorly. A lack of pre-launch tests has been raised as a potential cause of immediate failures, but it would be simplistic to suggest that this would completely eliminate the problems that companies encounter following a system launch. A successful launch … More

The post Dealing with a system launch: It requires more than just testing appeared first on Help Net Security.

How to use the cloud to improve your technology training

Anyone who has tried to hire an IT expert knows that the shortage of qualified people is real. We’re not just talking about IT security jobs, either. Almost every area of tech faces a skills shortage that threatens to sap productivity and presents challenges to IT departments of all sizes. Informal on-the-job training has been the norm for most IT teams. However, the rise of cyberthreats and the pace at which they arise leaves companies … More

The post How to use the cloud to improve your technology training appeared first on Help Net Security.

Zero login: Fixing the flaws in authentication

Passwords, birth certificates, national insurance numbers and passports – as well as the various other means of authentication, that we have relied upon for the past century or more to prove who we are to others – can no longer be trusted in today’s digital age. That’s because the mishandling of these types of personally identifiable information (PII) documents from birth, along with a string of major digital data breaches that have taken place in … More

The post Zero login: Fixing the flaws in authentication appeared first on Help Net Security.