This guide provides a practical path to improved ransomware readiness through unified
infrastructure, backup and data-intelligence.
With over 75% of organizations expected to be targets of ransomware attacks between now
and 2025, a path toward ransomware resilience must become the new normal. Organizations hit...
Cyber criminals are opportunistic and merciless, targeting security vulnerabilities such as weak passwords or unnecessary administrator rights. The National Cyber Security Centre recently found that 23.2 million victim accounts worldwide used 123456 as the password, and many companies still provide full admin rights...
A group of cybersecurity professionals has launched Respect in Security to take a stand against all forms of harassment within the industry. Initiative co-founders Lisa Forte and Rik Ferguson describe their commitment to creating workplaces free from harassment and fear.
For the fifth consecutive year, the supply of those with cybersecurity skills is far too low to meet the demand, according to a new report. Cybersecurity pros offer insights on how to change that.
Are you tasked with starting or improving the security processes within your organization?
Expel’s CISO, Bruce Potter, provides tips on how to do more with less, or improve a less-than-stellar legacy program.
Evaluating MSSPs? Expel has accumulated a list of questions to ask during the evaluation process.
Here are 12 best questions you should consider asking any potential provider to help you determine which provider is the right fit for your organization.
Ransomware attacks are on the rise but it doesn't mean it's time to panic.
Expel’s SOC team shares tips on what you can do to keep your organization safe and stay resilient against these types of attacks.
Are you in the process of selecting endpoint, network, or SIEM security products? Expel has the expertise you can rely on during the evaluation process.
Expel’s CISO, Bruce Potter, provides insights on budget planning when determining your security spend.
Drive operational resilience with IT and security teams collaboration.
Remove the roadblocks to resilience.
When security and IT are working in harmony, they’re able to drive continuous improvement and use accurate and repeatable processes to customize playbooks and policies for smarter, automated responses...
A year ago, Chris Pierson and BlackCloak studied executives at top global pharma companies to learn the extent of password-based vulnerabilities. The findings weren't reassuring. Pierson revisited the study this year with a select few entities to see if the needle has moved in a more secure direction.
In a video...
CISO Gary Hayslip prides himself on being a mentor to up-and-coming cyber pros. But he also takes leadership roles in two causes that don't get nearly as much attention: stress management and building a more neurodiverse workforce.
As a cybersecurity leader, it's one thing to earn a seat at the senior management table, but it's quite another to find - and use - your voice in that role, says Alex Cunningham, CISO at Advisor360°, who discusses leadership and how to create a cybersecurity culture.
Antivirus (AV) software has generally been regarded by businesses as the best and simplest defense to keeping data and systems secure. That somehow, it is nearly unconquerable. In reality, while AV products are certainly a must-have in your security solutions suite, they do not provide 100% protection against...
“What are we doing about Cybersecurity?”
This question unnerves even the most sure-footed IT leaders. Many would attribute such anxiety to uncertainty surrounding whether their investments are sufficient to secure their organization. Others would say their budget is insufficient to achieve the visibility they...
For years, organizations and IT professionals have turned to Microsoft’s PowerShell for its efficiency and ease of use.
It provides a well-integrated command-line experience for the operating system, and a simple way to manipulate server and workstation components. PowerShell is often treated as more secure than...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.