Help Net Security
C-level cybersecurity attitudes as enterprises embrace the everywhere workplace
Ivanti unveiled the findings of a Frost & Sullivan study which investigates the impact of the COVID-19 pandemic on cybersecurity and compliance attitudes and behaviors in …
5G business smartphone shipments to grow steadily
5G business smartphone shipments will grow at a CAGR of 28% over the 2021-2026 forecast period, according to a Strategy Analytics forecast. High positive growth is expected in …
Collaboration between network access brokers and ransomware actors deepens
In this Help Net Security podcast, Brandon Hoffman, CISO at Intel 471, discusses about the increased collaboration between network access brokers (NAB) and ransomware …
Why passwordless is not always passwordless
The concept of passwordless authentication has been gathering steam. Gartner anticipates that by 2022, 60% of large and global enterprises will implement some sort of …
How to glean user insight while respecting personal privacy
While each person has a unique personality and identity, the digital world has no patience for individuality. The web tries with its every fiber to store, analyze, and …
Application level data protection hindered by misperceptions and complexities
Companies plan to take extensive actions in the next 12 months to address a broad concern for sensitive data being unprotected in use at the application layer, Entrust and …
661 fines issued since GDPR became enforceable, totaling €292 million
3 years since rolling out in May 2018, there have been 661 GDPR fines issued by European data protection authorities. Every one of the 28 EU nations, plus the United Kingdom, …
Businesses embracing cloud more than ever
Organizations are accelerating their cloud journey to take advantage of its flexibility, control costs, speed time-to-market, and simplify data management, according to …
3.4 billion credential stuffing attacks hit financial services organizations
Akamai published a report that provides an analysis of both global and financial services-specific web application and credential stuffing attack traffic, revealing …
18 is the new 20: CIS Controls v8 is here!
The moment we’ve all been waiting for is finally here. The Center for Internet Security (CIS) officially launched CIS Controls v8, which was enhanced to keep up with evolving …
Endpoint security: How to shore up practices for a safer remote enterprise
It’s a long-held belief that enterprise IT teams are overworked. It’s also considered common knowledge that their jobs have only gotten harder in the days since workforces …
The basics of security code review
With staffing ratios often more than 200 developers for every AppSec professional, scaling security requires increasing the developer’s engagement in securing the product. To …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts