To mark Cybersecurity Awareness Month, the National Cyber Security Alliance and U.K. based behavioral science and data analytics company, CybSafe, have released their Annual Cybersecurity Attitudes and Behaviors Report 2021, which uncovers key trends, behaviors and habits among tech users.
The latest edition of the ISMG Security Report features an analysis of attempts made by European law enforcement to encourage young cybercriminals to channel their skills in more ethical ways. Also featured: Fraud detection and response; inspiring behavioral change.
As Cybersecurity Awareness Month kicks off this week, U.S. President Joe Biden has weighed in on his administration's efforts to curb cyberattacks and bolster the federal government's security posture.
Of all the areas under his direction - business continuity, GRC, data governance - third-party risk is the most challenging, says Peter Gregory, senior director of cyber GRC at GCI General Communications Inc. "Their breach is my breach," he says, offering mitigation advice.
If the process of building a cohesive security plan seems daunting, or there just isn’t enough time, expertise or resources to complete the project yourself, help is here for building, maintaining and continuously evolving your cybersecurity program to meet current and future challenges.
Download this whitepaper...
The day-to-day pressures of being a CISO are enormous and extend to matters far beyond those of incident response time. Meanwhile, traditional approaches to training cybersecurity team members have either been limited by scalability, lack of hands-on learning, or cost.
So, how much can Simulation-based Cybersecurity...
In theory, organizations are best protected by a layered security approach to cybersecurity based on best-in-class security tools.
In reality, the desired outcome is rarely achieved.
Why? Because most teams are not fully trained to use the technology on which their security program is built.
Small businesses have been disproportionately affected by hackers in recent months. To aid in countering the threat, Mastercard has launched a cybersecurity education effort targeting this market segment. Paul Trueman, a senior vice president Mastercard, explains the “Trust Center” initiative.
What really makes a "strong" password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?
For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries'...
Motivation, retention, and support are the crucial components of every successful security awareness training program. After you’ve got your program in place and it’s optimized to motivate adult learners, you can start to focus on improving the ‘stickiness’ of your program by focusing on improving your...
The best way to change user behavior and create a culture of enhanced security awareness is through a comprehensive security program that leverages a wide variety of tools and techniques. During this webinar we'll explore how organizations can develop a fit-for-purpose cyber awareness strategy that engages employees,...
You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? Here's the great news. Creating a security awareness strategy that not only educates, but...
Want to improve how your organization
delivers and absorbs security awareness
training? Then it comes down to
reinventing your approach, including
Download this eBook to learn more about:
What's wrong with traditional training methods;
Lessons learned from Barracuda's customers;
How to measure...