security practices
The proliferation of non-human identities
97% of non-human identities (NHIs) have excessive privileges, increasing unauthorized access and broadening the attack surface, according to Entro Security’s 2025 State …
How to improve response to emerging cybersecurity threats
Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help …
Securing data at the intersection of the CISO and CDO
Two groups in particular play a key and critical role in ensuring data governance and security: the CISO and the CDO. CISOs are responsible for identifying and managing risks …
How CISOs can improve security practices to keep up with evolving technologies
TikTok and Lensa AI have sparked worldwide conversations on the future of social media and consumer data privacy. In this Help Net Security video, Rick McElroy, Principal …
Enterprise security challenges and increased cloud usage fueled by remote work
81% of U.S.-based IT professionals believe that having remote workers has increased enterprise security challenges, while 74% acknowledge that their company’s use of cloud …
Consumers are increasingly concerned about online security and imminent attacks
According to a new Sophos Home survey, forty-five percent of consumers say they’re more at risk of being hit by an attack now than they were before the pandemic, and 61% …
Rebuilding your security culture as employees return to the office
The return to work allows security teams to refocus on areas of their insider risk management program that may have been swept under the rug while working remotely. As …
It’s time for companies to take a hard look at how they manage secrets
Leaked infrastructure secrets – code, credentials and keys – which are exposed accidentally or intentionally cost companies an average of $1.2 million in revenue …
SolarWinds breach severity perception increasing over time
(ISC)² has published the results of an online survey of 303 cybersecurity professionals from around the globe in which respondents compared their perception of the severity of …
Which security practices lead to best security outcomes?
A proactive technology refresh strategy and a well-integrated tech stack are, according to a recent Cisco report, two security practices that are more likely than many others …