Please turn on your JavaScript for this page to function normally.
identity theft
Preventing document fraud in a world built on digital trust

All digital markets are built on trust and that trust has been reduced to an algorithm driven by proof of identity, which currently remains heavily reliant on formal documents …

Log4j
4 practical strategies for Log4j discovery

For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within …

risk
Extracting value from the interconnected network of risk management

From the CISO to the SOC operator, defenders struggle to maintain complete situational awareness. Holistic approaches to risk management require the implementation of a …

Demi Ben-Ari
How to handle third-party security risk management

In this Help Net Security interview, Demi Ben-Ari, CTO at Panorays, talks about third-party security risk management and the repercussions of a third-party breach. He also …

see
We need a Cyber Awareness Century

For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …

data
Most cybersecurity leaders use microsegmentation to augment corporate network security

In today’s era of remote employees and an ever expanding variety of connected devices, network security is becoming increasingly complex. To compensate, cybersecurity …

SIEM
Why integrating SIEM tools is crucial to managing threats

Maintaining cybersecurity for organizations has never been more complex; now that remote and hybrid work has become the norm, access to a company’s network is no longer …

chess
Proven third-party risk management strategies

As cyber threats continue to plague enterprises and the third-party partners and suppliers they work with, organizations that have prioritized the development of a robust …

Cybersecurity risk management
While businesses are ramping up their risk mitigation efforts, they could be doing more

Zurich North America and Advisen have released a survey of corporate risk managers and insurance buyers revealing current views about information security and cyber risk …

money
80% of organizations plan to increase spending on cybersecurity posture management

80% of IT and security professionals plan to increase spending on their cybersecurity posture management over the next 12-18 months, according to a Balbix survey. …

organize
Security leaders facing challenges in managing and securing distributed work environments

Absolute Software announced new insights into how organizations are rethinking and rebuilding their operating models after more than 18 months of remote work forced massive …

passwordless
IT leaders confident in their organization’s network security, IT managers have doubts

While IT leaders believe they have strong security practices in place, their continual search for additional network security capabilities suggests that this confidence may be …

Don't miss

Cybersecurity news