access management
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16113038/strategy-1400-2-400x200.jpg)
8 cybersecurity predictions shaping the future of cyber defense
Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of …
![Nudge Security](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11132253/nudge-1500-400x200.webp)
Product showcase: How to track SaaS security best practices with Nudge Security
As technology adoption has shifted to be employee-led, IT and security teams are contending with an ever-expanding SaaS attack surface. At the same time, they are often spread …
![Deepak Taneja](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23131847/deepak_taneja-2-zilla_security-400x200.jpg)
How organizations can navigate identity security risks in 2024
Managing IAM challenges in hybrid IT environments requires a holistic approach, integrating solutions and automating processes to ensure effective access controls and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/18210714/solarwinds-2024-400x200.jpg)
RCE vulnerabilities fixed in SolarWinds enterprise solutions
SolarWinds has released updates for Access Rights Manager (ARM) and (Orion) Platform that fix vulnerabilities that could allow attackers to execute code on vulnerable …
![OAuth](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31115152/oauth1-400x200.jpg)
How threat actors abuse OAuth apps
OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093232/shield1-400x200.jpg)
Demystifying SOC-as-a-Service (SOCaaS)
Threat actors aren’t looking for companies of specific sizes or industries, they are looking for opportunities. Given that many companies operate in the dark and overlook …
![Marco Eggerling](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16122954/marco_eggerling-2-check_point-400x200.jpg)
How CISOs navigate policies and access across enterprises
In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/21102340/zero-trust-future-400x200.jpg)
Zero trust implementation: Plan, then execute, one step at a time
82% of cybersecurity professionals have been working on implementing zero trust last year, and 16% should be on it by the end of this year. The challenges of zero trust …
![Jean-Philippe Aumasson](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140145/jean_philippe_aumasson-2-taurus-400x200.jpg)
Beyond blockchain: Strategies for seamless digital asset integration
In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, …
![problem](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16145605/problem1-400x200.jpg)
Security considerations during layoffs: Advice from an MSSP
Navigating layoffs is complex and difficult for many reasons. Not only do human resources and direct managers bear the onus of responsibility when conducting exit …
![Chris Mixter](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/05115249/chris_mixter-2-gartner-400x200.jpg)
CISOs’ crucial role in aligning security goals with enterprise expectations
In this Help Net Security interview, Chris Mixter, Vice President, Analyst at Gartner, discusses the dynamic world of CISOs and how their roles have evolved significantly over …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Preventing insider access from leaking to malicious actors
In this Help Net Security video, John Morello, CTO of Gutsy, discusses the often-overlooked aspect of cybersecurity – the offboarding process. He outlines the real-world …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD