Please turn on your JavaScript for this page to function normally.
Data
Do you need cyber asset attack surface management (CAASM)?

In this video for Help Net Security, James Mignacca, CEO at Cavelo, talks about cyber asset attack surface management (CAASM), which Gartner recently identified as an emerging …

backup
Backup is key for cyber recovery

Granular and air-gapped backup are critical to data recovery, when, not if, a business falls victim to ransomware. Those are among the key takeaways from an Enterprise …

Simon Winchester
The changing role of the CCO: Champion of innovation and business continuity

In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of the chief compliance officer (CCO) …

hands
Dark data is a pain point for many security leaders

BigID published a research report exploring today’s challenges organizations face with protecting their most valuable data. The study uncovered a number of critical findings: …

face
Consumers feel data leakage is inevitable so many have stopped caring

Imperva releases findings from a global study on consumer perceptions of data privacy and trust in digital service providers. In an increasingly digital world, consumers feel …

data
Data democratization leaves enterprises at risk

Today’s digital landscape has increased enterprises’ reliance on large datasets and analytics, underscoring the value of data for business. A recent report from NewVantage …

ransomware
Paying ransom doesn’t guarantee data recovery

OwnBackup announced the findings of a global survey conducted by Enterprise Strategy Group (ESG) that reveals a staggering 79% of respondent organizations have been targeted …

backup
People’s habits around personal and corporate data backup procedures

In this video for Help Net Security, Jon Fielding, Managing Director at Apricorn, talks about a survey of thousands of Twitter users, around their personal and corporate data …

data
The challenges of consumer data and PII usage

In this Help Net Security video, Nong Li, CEO at Okera, talks about the challenges of using and managing consumer data and personally identifiable information (PII). As …

VR
Is IT ready for the metaverse? If not, it should be

Info-Tech Research Group has released a research to help IT departments identify risks in deploying metaverse solutions and how to mitigate them. This new research explores …

HDD
57% of people can’t recall if they ever backed up their important documents

Apricorn announced findings from a Twitter poll exploring device data and backup processes ahead of World Backup Day on March 31st. When asked to be honest with their …

healthcare
Deploying pseudonymization techniques to protect health data

A report of the European Union Agency for Cybersecurity (ENISA) explores how pseudonymization techniques can help increase the protection of health data. The healthcare sector …

Don't miss

Cybersecurity news