Please turn on your JavaScript for this page to function normally.
passwordless
Passwordless will overtake other methods to secure employee identities

Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more …

shield
Does your company need secure enclaves? Five questions to ask your CISO

Some of the biggest barriers to cloud adoption are security concerns: data loss or leakage, and the associated legal and regulatory concerns with storing and processing data …

lock
How to assess and mitigate complex supply chain risks

As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions …

Phishing
Phishing threats are increasingly convincing and evasive

In this Help Net Security video, Tonia Dudley, VP, CISO at Cofense, provides a look at the various changes seen in the phishing threat landscape. Dudley talks about the impact …

password
False sense of safety undermines good password hygiene

LastPass released findings from its fifth annual Psychology of Password report, which revealed even with cybersecurity education on the rise, password hygiene has not …

week in review
Week in review: High-severity OpenSSL vulnerabilities fixed, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: ConnectWise backup solutions open to RCE, patch ASAP! ConnectWise has fixed a …

patch
November 2022 Patch Tuesday forecast: Wrapping up loose ends?

October 2022 Patch Tuesday was a little unusual last month, as it ‘kind of’ repeated itself the following week. Microsoft turned around and released a series of non-security …

mobile device
Outmaneuvering cybercriminals by recognizing mobile phishing threats’ telltale markers

Preventative medicine has long been recognized as a vital approach in safeguarding our physical health. We take a variety of tests and assessments so that doctors can uncover …

USA
Privacy, compliance challenges businesses face after Roe v. Wade repeal

In this Help Net Security video, Rebecca Herold, IEEE member and CEO of Privacy & Security Brainiacs, discusses data, privacy, surveillance, and compliance challenges …

shark
The most frequently reported vulnerability types and severities

Bishop Fox collected and analyzed publicly disclosed reports from January to July 2022 to better understand the most frequently reported vulnerability types, the …

Election
The biggest threat to America’s election system? Ourselves

With midterm elections right around the corner, many Americans are questioning whether they can trust the election process. To be honest, this is fair, given the highly …

cloud storage
Top 4 priorities for cloud data protection

Recent BigID research found that 86% of organizations use multiple cloud platforms to store their data- across IaaS, PaaS, and SaaS. As the reliance on cloud services …

Don't miss

Cybersecurity news