
Cybersecurity

When IT meets OT: Cybersecurity for the physical world
While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat 14 Mar 2025 • , 4 min. read Amid all the high-profile data breaches and ransomware attacks on IT systems in recent years, the threat to business-critical operational technology (OT) is still often underestimated….

How to Calculate Cybersecurity ROI for CEOs and Boards | TechTarget
Everyone knows we need cybersecurity. But whether they admit it or not, businesses don’t always want to pay for it. Too often, the C-suite sees security as a cost center, making it difficult for CISOs to secure funding for new tools and initiatives. While cybersecurity doesn’t directly drive revenue, it does maximize business continuity,…

4 Arrested Over Scattered Spider Hacking Spree
WIRED reported this week on public records that show the United States Department of Homeland Security urging local law enforcement around the country to interpret common protest activities and surrounding logistics—including riding a bike, livestreaming a police encounter, or skateboarding—as “violent tactics.” The guidance could influence cops to use everyday behavior as a pretext for…

How to Build a Cybersecurity Culture Across Your Business | TechTarget
Every organized group of people has a culture — a combination of norms that guide them, structured roles they fill and common practices and tools they use to play their roles and achieve their goals. Well-managed companies have an overall corporate culture and specific ones in key business areas, including cybersecurity. A cybersecurity culture…

How cybersecurity leaders can defend against the spur of AI-driven NHI
Machine identities pose a big security risk for enterprises, and that risk will be magnified dramatically as AI agents are deployed. According to a report by cybersecurity vendor CyberArk, machine identities — also known as non-human identities (NHI) — now outnumber humans by 82 to 1, and their number is expected to increase exponentially. By…

22 Free Cybersecurity Tools You Should Know About | TechTarget
Cybersecurity tools aren’t just for the enterprise anymore; they’re essential for every type and size of organization. Some tools specialize in antivirus, while others focus on spear phishing, network security or scripting. Even the best cybersecurity products can only do a few things very well, and there is no room for error. Effective products,…

The 6 biggest cybersecurity breaches of 2025 so far
2025 is now halfway through, and we have a pretty good idea of what the biggest tech trends will be. AI, cryptocurrency, and AR/VR are just some of the fast-developing technologies that have defined the year so far. However, there’s one tech trend that has continued to flourish year after year, unfortunately: Data breaches. As…

Making it stick: How to get the most out of cybersecurity training
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will kick in when a danger is near 28 Mar 2025 • , 5 min. read Let me preface this with an attempt at a story: Sarah’s eyes darted across the email subject line, which read:…
The best VPN service for 2025
Virtual private networks (VPNs) are notoriously difficult to work with. Maybe you’re a remote worker who has to sign in to one each day to access company services, or you tried it once because you heard you could use it to access international content, but were met with laggy service and frequent disruptions. Today’s VPNs…

Breaking down silos in cybersecurity – Help Net Security
All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and operations. Their presence inhibits communication and collaboration. As companies scale from startup to mid-sized and beyond, silos multiply and ossify. As operations expand from one site to many, from on-premises to cloud, from…