Please turn on your JavaScript for this page to function normally.
hardware security
A robust security strategy starts with the hardware

Intel released the results of a study exploring how organizations approach security innovation in an increasingly digital world to stay ahead of the evolving threat landscape. …

robot
What is undermining ML initiatives?

Comet announced the results of its recent survey of machine learning professionals. Hundreds of enterprise ML practitioners were asked about their experiences and the factors …

certificate
Lack of CLM maturity is putting organizations at risk

More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and …

data
Data literacy to lead global workplaces by 2030

21% of employees believe their employer is preparing them for a more data-oriented and automated workplace, according to a research from Qlik. This is despite most business …

professional
How to plan for increased security risks resulting from the Great Resignation

The Great Resignation is sweeping the world, and the causes and impacts are still being analyzed. Texas A&M University professor Anthony Klotz coined the term, predicting …

shadow
Will vacancies create security voids?

Automation may be shortening the Mean Time to Response (MTTR) when it comes to detecting and responding to attacks, but there is still no substitute for the human in the kill …

identity
Does the future of digital identity offer us greater security and convenient experiences?

Much of the promise associated with future digital identity infrastructures is associated with greater automation of the identity lifecycle and the provision of greater …

Miles Hutchinson
Why identity and access management strategies need a booster

In this interview with Help Net Security, Miles Hutchinson, CISO of Jumio, talks about the pain points of identity and access management and the importance of strenghtening …

hands
How to prepare your organization for this year’s cybersecurity incidents

Sotero has shared its top five predictions for data security and privacy in 2022. Cybersecurity incidents have risen 125% year over year and will continue to grow …

gears
Preventing software security vulnerabilities with automation

A team of UTSA researchers is exploring how a new automated approach could prevent software security vulnerabilities. The team sought to develop a deep learning model that …

mobile security
A 2022 priority: Automated mobile application security testing

The use of mobile devices has skyrocketed in the past two years and with it the mobile app market. It’s predicted mobile apps will generate more than $935 billion in revenue …

Oded Hareven
The importance of securing machine-to-machine and human-to-machine interaction

In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid …

Don't miss

Cybersecurity news