digital transformation
![Ashley Harrington](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/08122612/ashley-harrington-2-aspida-400x200.webp)
Managing cyberattack fallout: Financial and operational damage
In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations and financial health. Beyond …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151859/software-dev2-400x200.jpg)
Security challenges mount as companies handle thousands of APIs
Modern applications are taking over enterprise portfolios, with apps classed as modern now making up 51% of the total, up by more than a quarter in the last year, according to …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/06125626/digital_transformation1-400x200.jpg)
Businesses must prioritize digital trust to avoid major problems
As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/21112520/identity-id-400x200.webp)
Digital ID adoption: Implementation and security concerns
As digital transformation accelerates, understanding how businesses are preparing for and implementing digital ID technologies is crucial for staying ahead in security and …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20080340/strategy-400x200.jpg)
The next wave of mobile threats
According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11084624/zero-trust-1500-1-400x200.webp)
Industrial sectors embrace zero trust for enhanced security
Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments, according to Xage Security. Zero …
![security](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27150233/security-1600-400x200.webp)
How to design and deliver an effective cybersecurity exercise
Armed forces have always utilized war-gaming exercises for battlefield training to prepare for times of conflict. With today’s digital transformation, the same concept is …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13114656/laptop4-400x200.jpg)
Tech industry’s focus on innovation leaves security behind
The rapid digital transformation and technological progress within the technology sector have enlarged the attack surface for companies operating in this space, according to …
![Asad Siddiqui](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/05124518/asad_siddiqui-2-lastpass-400x200.webp)
LastPass’ CIO vision for driving business strategy, innovation
Recently, LastPass appointed Asad Siddiqui as its CIO. He brings over two decades of experience leading startups and large technology organizations. It was the perfect time …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28200051/privacy-man-400x200.jpg)
How organizations can keep up with shifting data privacy regulations
With no sign of regulations slowing down, enterprises struggle to keep pace with the rapid changes. According to a recent NTT Data survey of business executives, 3 in 4 …
![send money](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/17142025/send_money-1400-400x200.jpg)
Enterprises’ progress in digital trust implementation is far from great
A growing divide separates leaders with a firm grasp on digital trust from those at the bottom of the pool, according to DigiCert. While digital trust overwhelmingly remains a …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163441/computer-1-400x200.jpg)
AI PC shipments are expected to surpass 167 million units by 2027
Shipments of AI PCs – personal computers with specific system-on-a-chip (SoC) capabilities designed to run generative AI tasks locally – are expected to grow from nearly 50 …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders