The 2021 Cybersecurity Complexity Study was conducted in the summer of 2021. Focused on EU & UK enterprises, the survey
received more than 200 responses from organisations primarily in professional services (37%)
and financial services (32%), but also in retail, utilities and manufacturing, mainly with...
For fraudsters, there has been no respite. The fraud
economy took no pandemic hit. There was no
reduction in schemes among adversaries and they
experienced no job losses. Instead, shifts toward an increased dependency on digital channels have presented a myriad of new opportunities for illicit
financial gain....
The role of the chief information security officer (CISO) is changing. CISOs are evolving from contributors with a limited portfolio of responsibility, to highly integrated and strategic drivers of business transformation. The most successful organizations are recognizing that genuine digital and business...
Cloud-based services are affecting governance, risk management and compliance practices in Australia, says Tim Nedyalkov, who is a technology information security officer with Commonwealth Bank. He discusses the differences between how managers and practitioners approach the problems.
This guide provides a practical path to improved ransomware readiness through unified
infrastructure, backup and data-intelligence.
With over 75% of organizations expected to be targets of ransomware attacks between now
and 2025, a path toward ransomware resilience must become the new normal. Organizations hit...
Cyber criminals are opportunistic and merciless, targeting security vulnerabilities such as weak passwords or unnecessary administrator rights. The National Cyber Security Centre recently found that 23.2 million victim accounts worldwide used 123456 as the password, and many companies still provide full admin rights...
A group of cybersecurity professionals has launched Respect in Security to take a stand against all forms of harassment within the industry. Initiative co-founders Lisa Forte and Rik Ferguson describe their commitment to creating workplaces free from harassment and fear.
For the fifth consecutive year, the supply of those with cybersecurity skills is far too low to meet the demand, according to a new report. Cybersecurity pros offer insights on how to change that.
Ransomware attacks are on the rise but it doesn't mean it's time to panic.
Expel’s SOC team shares tips on what you can do to keep your organization safe and stay resilient against these types of attacks.
Are you in the process of selecting endpoint, network, or SIEM security products? Expel has the expertise you can rely on during the evaluation process.
Expel’s CISO, Bruce Potter, provides insights on budget planning when determining your security spend.
Are you tasked with starting or improving the security processes within your organization?
Expel’s CISO, Bruce Potter, provides tips on how to do more with less, or improve a less-than-stellar legacy program.
Evaluating MSSPs? Expel has accumulated a list of questions to ask during the evaluation process.
Here are 12 best questions you should consider asking any potential provider to help you determine which provider is the right fit for your organization.
Drive operational resilience with IT and security teams collaboration.
Remove the roadblocks to resilience.
When security and IT are working in harmony, they’re able to drive continuous improvement and use accurate and repeatable processes to customize playbooks and policies for smarter, automated responses...
A year ago, Chris Pierson and BlackCloak studied executives at top global pharma companies to learn the extent of password-based vulnerabilities. The findings weren't reassuring. Pierson revisited the study this year with a select few entities to see if the needle has moved in a more secure direction.
In a video...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.