authentication
![access](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29223248/access-400x200.webp)
The importance of access controls in incident response
The worst time to find out your company doesn’t have adequate access controls is when everything is on fire. The worst thing that can happen during an incident is that your …
![passwords](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/02181830/passwords-1-400x200.jpg)
How secure is the “Password Protection” on your files and drives?
People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate …
![Mike Lemberger](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/15115539/mike_lemberger-2-visa-400x200.webp)
Triangulation fraud: The costly scam hitting online retailers
In this Help Net Security interview, Mike Lemberger, Visa’s SVP, Chief Risk Officer, North America, discusses the severe financial losses resulting from triangulation fraud, …
![passwords](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/02181832/passwords-2-400x200.jpg)
Most people still rely on memory or pen and paper for password management
Bitwarden surveyed 2,400 individuals from the US, UK, Australia, France, Germany, and Japan to investigate current user password practices. The survey shows that 25% of …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/09054813/mfa-2-400x200.webp)
What is multi-factor authentication (MFA), and why is it important?
Setting up MFA can seem daunting for consumers just beginning to clean up their security postures. In this Help Net Security video, Larry Kinkaid, Manager, Cybersecurity …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16165304/biometrics-1400-400x200.jpg)
Who owns customer identity?
When I’m talking with prospective clients, I like to ask: which department owns customer identity? Everyone immediately looks towards a different team. While every team …
![EJBCA](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/07145905/ejbca-1500-400x200.webp)
EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)
EJBCA is open-source PKI and CA software. It can handle almost anything, and someone once called it the kitchen sink of PKI. With its extensive history as one of the …
![Charlotte Wylie](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03113824/charlotte_wylie-2-okta-400x200.webp)
Strategies for secure identity management in hybrid environments
In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. She …
![browser cookies](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03085856/browser_cookies-400x200.webp)
How Google plans to make stolen session cookies worthless for attackers
Google is working on a new security feature for Chrome called Device Bound Session Credentials (DBSC), meant to prevent attackers from using stolen session cookies to gain …
![Ray](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/27095008/ray-1500-400x200.webp)
AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)
Attackers are leveraging a vulnerability (CVE-2023-48022) in Anyscale’s Ray AI software to compromise enterprise servers and saddle them with cryptominers and reverse …
![healthcare cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03091716/healthcare-cloud-400x200.jpg)
How security leaders can ease healthcare workers’ EHR-related burnout
Staff experiencing burnout in healthcare settings is not something that security leaders typically worry about – unless, maybe, it is the security team itself that is …
![Sanjay Macwan](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/21120823/sanjay_macwan-2-vonage-400x200.jpg)
Leveraging AI and automation for enhanced cloud communication security
In this Help Net Security interview, Sanjay Macwan, CIO and CISO at Vonage, addresses emerging threats to cloud communications and the role of AI and automation in …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege