Help Net Security
The challenge of planning an IAM strategy for multi-cloud environments to avoid risk
According to the Strata Identity and Forrester study, 78% of IT decision-makers said managing user identities between multiple clouds is the number one challenge. The study …
Trends, threats and techniques that comprised the 2021 threat landscape
Ransomware dominated the threat landscape in 2021, with groups adopting new techniques such as double extortion and “as-a-service” models to evade detection and maximize their …
How the cloud skills gap is hindering business development
Cloudreach released data highlighting the latest cloud technology trends, underscoring the impact the cloud skills gap is having on businesses. More than 70% of surveyed IT …
Data literacy to lead global workplaces by 2030
21% of employees believe their employer is preparing them for a more data-oriented and automated workplace, according to a research from Qlik. This is despite most business …
How to unlock a resilient hybrid work plan
Brivo released a report which reveals that cloud-based access control and high-quality physical security data are paramount when it comes to unlocking a resilient hybrid work …
Big data as a service market to reach $101 billion by 2028
The global big data as a service (BDaaS) market accounted for $11.3 billion in 2019 and is expected to reach $101 billion by 2028, growing at a CAGR of 27.4% from 2021 to …
New cyberespionage campaign targeting ISPs, research entities
ESET Research discovered a still-ongoing cyberespionage campaign using a previously undocumented Korplug variant by the Mustang Panda APT group. The current campaign exploits …
Security threats today’s businesses need to look out for
A Logicalis survey reveals that while 94% of CIOs acknowledge some form of serious threat over the next 12 months, only 27% list business continuity and resilience as a …
Zero trust implementation for device access falling behind
An Infinipoint study reveals a gap between a high interest in zero trust for device access but a low adoption due to implementation obstacles. 68% of IT and security …
How will recent risk trends shape the future of GRC
Risk management has never been more critical to organizations. The rate of change is happening faster than ever in our world. The kinds of risks facing organizations evolve …
Strengthening third-party vendor programs in times of crisis and beyond
The ongoing global turmoil has tested the supply chain across industries in a myriad of ways – from strained resources and remote workflows to security concerns and more. …
The biggest security threats to today’s businesses
While 94% of CIOs acknowledge some form of serious threat over the next 12 months, only 27% list business continuity and resilience as a top-three priority during the next 12 …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits