![syringe](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094039/syringe2-400x200.jpg)
Top 5 cybersecurity considerations for file uploads of vaccination records
As vaccination mandates become more common, immunization records are increasingly required across the world. Organizations are turning to the digital space to upload images of …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110509/usa-flag-1-400x200.jpg)
An introduction to U.S. data compliance laws
Due to technological advances like the rise of cloud storage and social media, there is an increasing concern over privacy — especially when it comes to how businesses collect …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Lack of API visibility undermines basic principle of security
One of the oldest principles of security is that you cannot secure what you cannot see. Visibility has always been the starting place for monitoring and protecting attack …
![Demi Ben-Ari](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/15113947/demi_ben_ari_2-panorays-1-400x200.jpg)
How to handle third-party security risk management
In this Help Net Security interview, Demi Ben-Ari, CTO at Panorays, talks about third-party security risk management and the repercussions of a third-party breach. He also …
![shadow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194957/shadow-400x200.jpg)
Bots are lurking in your zombie and shadow APIs
By far this year’s biggest trend that we’ve observed in the land of APIs is that every organization has shadow and zombie APIs and they’re a much bigger issue than most people …
![eavesdropping](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/21122549/eavesdrop-mobile-400x200.jpg)
The six most common threats against the device that knows you best
What is the most intimate relationship in your life—aside from your partner, your children or your parents? For many of us, it’s our mobile phone. It’s the last thing we see …
![](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/14163140/maor_bin-adaptive_shield-1200-400x200.jpg)
How to improve your SaaS security posture and reduce risk
In this Help Net Security interview, Maor Bin, CEO at Adaptive Shield, talks about the SaaS security space and how Adaptive Shield help security teams gain control over their …
![tunnel light](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111058/tunnel-light-400x200.jpg)
Illuminating the path: Compliance as the key to security-by-design
Like taxes or going to the dentist, compliance is one of those topics that people often don’t like to contemplate. There are many reasons for the distaste but this …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102515/fire-400x200.jpeg)
Combating cybercrime: Lessons from a CIO and Marine veteran
A colleague asked me recently if I thought the FBI had finally experienced enough of the cyberattacks plaguing the United States and would now more aggressively pursue the …
![Bill Tolson](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/15095910/bill_tolson_2-archive360-400x200.jpg)
Cloud compliance: Falling out of it could spell doom
In this Help Net Security interview, Bill Tolson, VP of Global Compliance and eDiscovery at Archive360, talks about the importance of cloud compliance and what companies can …
![see](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100214/see-400x200.jpg)
We need a Cyber Awareness Century
For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135226/zero-number-1-400x200.jpg)
Operational technology and zero trust
Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?