Please turn on your JavaScript for this page to function normally.
fire
Combating cybercrime: Lessons from a CIO and Marine veteran

A colleague asked me recently if I thought the FBI had finally experienced enough of the cyberattacks plaguing the United States and would now more aggressively pursue the …

Bill Tolson
Cloud compliance: Falling out of it could spell doom

In this Help Net Security interview, Bill Tolson, VP of Global Compliance and eDiscovery at Archive360, talks about the importance of cloud compliance and what companies can …

see
We need a Cyber Awareness Century

For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …

zero
Operational technology and zero trust

Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …

Shark
When cybersecurity becomes terrifying

Some cybersecurity horror stories are not your typical horror stories: there’s no danger from a chainsaw-wielding maniac hiding behind a server rack, the Candyman won’t appear …

shield
When it comes to securing systems against quantum computers, there is no one-size-fits-all solution

Quantum computers will rapidly solve complex mathematical problems. This includes the ability to break both RSA and ECC encryption in seconds. In response, NIST has been …

point
Leveraging social media background checks to balance friction and risk

With ecommerce revenues higher than ever and estimated to reach $4.89 million in 2021 (per eMarketer), cart abandonment continues to be a major pain point for the industry and …

passwordless
The world’s worst kept secret and the truth behind passwordless technology

One of the biggest security risks of modern-day business is the mass use of passwords as the prime authentication method for different applications. When the technology was …

collaboration
Eliminate cyber friction with smarter technology

In modern organizations, it’s natural for there to be some friction between cybersecurity teams and employees. While the cybersecurity teams defends the …

identity
Humanizing hackers: Entering the minds of those behind the attacks

Have you ever wondered what are hackers like, where they are based, and what are they thinking? They are human like everyone else – you wouldn’t be able to tell a hacker from …

zero
The role of visibility and analytics in zero trust architectures

Zero trust architecture (ZTA) is not a new concept, but with the White House Executive Order published earlier this year, many in the networking space have started to ask …

hands
The cyber insurance dilemma: The risks of a safety net

Cybercriminals have become the modern mafia and ransomware attacks are the new shake-downs. Not only has the ask of the ransoms skyrocketed, but the average ransomware payment …

Don't miss

Cybersecurity news