strategy
![SpyCloud](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/25121618/spycloud-passwords-400x200.png)
Password vulnerability at Fortune 1000 companies
Despite often repeated advice of using unique passwords for online accounts – or at least the most critical ones – password reuse continues to be rampant. And, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Cloud-native security considerations for critical enterprise workloads
Since the advent of the public cloud as a viable alternative to on-premise systems, CIOs and CISOs have been citing security as one of the top concerns when it comes to making …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110124/saas-400x200.jpg)
How to secure customer data for SaaS success
Recently, some of the biggest names in SaaS have experienced customer support data breaches. With data playing an important role in the success of customer support, companies …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093017/insider_threat-400x200.jpg)
Legal industry at great risk from insider data breaches
A staggering 96% of IT leaders in the legal sector say insider breach risk is a significant concern, according to Egress. 77% think employees have put data at risk …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093228/shield3-400x200.jpg)
Five steps to maintain business continuity during the coronavirus pandemic
A five-phase strategic and systematic approach to strengthen the resilience of organizations’ current business models is key to business continuity during the coronavirus …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103351/businessman-400x200.jpg)
What’s preventing organizations from making pragmatic security decisions?
Human beings are poor judges of risk. For example, we perceive the risk of air travel to be higher than it actually is after a fatal aviation-related accident happens. We also …
![Python](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/23132931/python-400x200.jpg)
Python backdoor attacks and how to prevent them
Python backdoor attacks are increasingly common. Iran, for example, used a MechaFlounder Python backdoor attack against Turkey last year. Scripting attacks are nearly as …
![virus](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/03115844/virus-mouth-400x200.jpg)
Top priorities for business leaders during COVID-19 crisis
88% of organizations have encouraged or required employees to work from home, regardless of whether or not they showed coronavirus-related symptoms, according to a Gartner …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094155/keyboard2-400x200.jpg)
Crowdsourced pentesting is not without its issues
Crowdsourced security isn’t new anymore, having existed in one form or another as a consumable enterprise service since 2013 with the launch of the main crowdsourced platforms …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
Personal data protection today: We should demand more
The growing number of cybersecurity incidents reported each year – and the fact that many attacks remain unreported for security and PR reasons – can leave even …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
2020 cybersecurity risks: Insecure security tools, supply chains, abandonware
Considerable time and money are invested into looking for dangerous vulnerabilities in the most commonly used elements of IT infrastructure. Popular operating systems, …
![Work](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19140648/work-home-400x200.jpg)
The cybersecurity implications of working remotely
We sat down with Demi Ben-Ari, CTO at Panorays, to discuss the cybersecurity risks of remote work facilitated by virtual environments. The global spread of the COVID-19 …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?