access control
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Can zero trust kill our need to talk about locations?
As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Shedding light on the threat posed by shadow admins
Few organizations would purposefully hand a huge responsibility to a junior staff member before letting them fly solo on their own personal projects, but that’s effectively …
![Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194424/hands-keyboard-400x200.jpg)
A great deal of employees have inappropriate access to sensitive data
The onset of COVID-19 and resulting distributed workforce have introduced new and complex challenges for businesses, with 45% of IT decision-makers reporting increased …
![DRM](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/08140611/drm_lights-400x200.jpg)
How do I select a DRM solution for my business?
Digital rights management (DRM) is a method to protect copyrights for digital media. In a world where technology allows us to share and copy various media and files, it is …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095605/connection-400x200.jpg)
COVID-19 has increased urgency for businesses to adopt VSaaS and ACaaS
A research into the impact of COVID-19 on physical security purchasing decisions has revealed a sharp increase in the necessity/urgency for businesses to adopt hosted video …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092731/microsoft-active-directory-400x200.jpg)
Rethinking Active Directory security
In the wake of a cyberattack, Active Directory is sometimes dismissed as just another service that needs to be recovered, and security is an afterthought. But the hard reality …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
Minimizing cyberattacks by managing the lifecycle of non-human workers
The number of non-human workers is growing, particularly as global organizations increasingly prioritize cloud computing, DevOps, IoT devices, and other digital transformation …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Data industry trends to watch in 2021
Okera researchers revealed five pivotal data industry trends and predictions expected to emerge in 2021. “The COVID-19 pandemic forced companies across the board to accelerate …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Remote and cloud-based systems to be ruthlessly targeted next year
Home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021, Trend Micro predicts. Cybercriminals in 2021 will particularly …
![MacBook Pro](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/22132713/macbookpro-400x200.jpg)
How can companies secure a hybrid workforce in 2021?
This has been a uniquely transformative year. Prompted by a global pandemic, we’ve been forced to change many things about how we live, work, and relate. For most businesses, …
![vmware](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100820/vmware-400x200.jpg)
VMware releases workarounds for another critical flaw (CVE-2020-4006)
For the second time in less than a week, VMware is warning about a critical vulnerability (CVE-2020-4006). This time, the affected solutions are VMware Workspace One Access, …
![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093159/aws1-400x200.jpg)
AWS adds new S3 security and access control features
Amazon Web Services (AWS) has made available three new S3 (Simple Storage Service) security and access control features: Object Ownership Bucket Owner Condition Copy API via …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD