access management
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120648/cloud_security-1-400x200.jpg)
Cloud security predictions for 2024
As we reflect on the cybersecurity landscape and the trajectories of threat vectors, it’s evident that we’re on the cusp of a paradigm shift in cloud security. …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100835/servers-400x200.jpg)
Why you need to extend enterprise IT security to the mainframe
Organizations with mainframes face a unique challenge: extending consistency across the entire enterprise, including mainframe environments. The ongoing issue lies in the …
![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02145128/aws-depth-400x200.jpg)
Short-term AWS access tokens allow attackers to linger for a longer while
Attackers usually gain access to an organization’s cloud assets by leveraging compromised user access tokens obtained via phishing, by using malware, or by finding them …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03124019/microsoft-soc-400x200.jpg)
Microsoft introduces new access policies in Entra to boost MFA usage
As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to …
![cybersecurity investments](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23164757/cybersecurity-investments-400x200.jpg)
Business resilience becomes primary force behind cybersecurity investments
Over 80% of northern European organizations emphasize that the need to ensure business resilience is the top driver for their cybersecurity investments, according to Nixu. The …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/20151654/zero_trust-400x200.jpg)
Why zero trust delivers even more resilience than you think
Ten years ago, zero trust was an exciting, innovative perspective shift that security experts were excited to explore; today, it’s more likely to be framed as an inevitable …
![eyes](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19143700/eyes-400x200.jpg)
How to avoid the 4 main pitfalls of cloud identity management
Securing cloud identities isn’t easy. Organizations need to complete a laundry list of actions to confirm proper configuration, ensure clear visibility into identities, …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Avoidable digital certificate issues fuel data breaches
Among organizations that have suffered data breaches 58% were caused by issues related to digital certificates, according to a report by AppViewX and Forrester Consulting. As …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/24130334/cyber_insurance-2-400x200.jpg)
Understand the fine print of your cyber insurance policies
A significant gap is emerging between insurance providers, as organizations skip the fine print and seek affordable and comprehensive coverage, potentially putting them in a …
![eyes](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19143700/eyes-400x200.jpg)
Lack of visibility into cloud access policies leaves enterprises flying blind
Fragmented access policies are top security concern in multi-cloud environments, with more than 75% of enterprises reporting they do not know where applications are deployed …
![Charles Brooks](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/04105921/charles_brooks-2-georgetown_university_school_of_continuing_studies-400x200.jpg)
CISOs under pressure: Protecting sensitive information in the age of high employee turnover
In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171236/ransomware-2-400x200.jpg)
75% of consumers prepared to ditch brands hit by ransomware
As 40% of consumers harbor skepticism regarding organizations’ data protection capabilities, 75% would shift to alternate companies following a ransomware attack, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD