strategy
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103433/architecture-400x200.jpg)
Your cybersecurity strategy could use some ESP
Embedding cybersecurity into our enterprises remains a difficult problem to solve. Year after year, billions of dollars are spent on building checks and controls, but the rate …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
Most enterprises choose multi-cloud strategies, 55% plan to invest in data virtualization
79% of enterprises want better integrated security and governance for their data in the cloud, a survey from AtScale reveals. “As more enterprises embrace cloud …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
How adaptive trust makes security efficient
Zero trust is a comprehensive security framework that requires everyone—and every service account—to authenticate identity before entering the corporate network. Every app and …
![Password](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095338/password_field-400x200.jpg)
Soon, your password will expire permanently
Passwords have been around since ancient times and they now serve as the primary method for authenticating a user during the login process. Individuals are expected to use …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094319/idea-400x200.jpg)
Security operations and the evolving landscape of threat intelligence
In this podcast recorded at RSA Conference 2020, we’re joined by the ThreatQuotient team talking about a threat-centric approach to security operations, the evolution of …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104509/architecture-400x200.jpeg)
5 considerations for building a zero trust IT environment
Zero trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not …
![Headache](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195350/headache-400x200.jpg)
One in five SMBs use no endpoint security at all
An alarming number of SMBs (small to medium businesses) in the US and UK are not prepared for a potential cyber attack or breach, BullGuard warns. One-third of companies with …
![CyberArk RPA](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/20111932/cyberark-rba-400x200.jpg)
The importance of risk reduction for robotic process automation
Less than half of organizations have a privileged access management strategy in place for digital transformation technologies, like RPA, according to a CyberArk report. The …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093228/shield3-400x200.jpg)
Changing the mindset of the CISO: From enforcer to enabler
With digital transformation investments expected to reach a staggering $7.4 trillion before 2023, organizations realize that they must disrupt their markets or risk being …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135226/zero-number-1-400x200.jpg)
Are CISOs ready for zero trust architectures?
Zero trust is a concept that is gaining an increasingly large and dedicated following, but it may mean different things to different audiences, so let’s start with a …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18090604/office365-laptop-400x200.jpg)
The top four Office 365 security pain points
Many novice Office 365 (O365) shops do not know where platform-specific security vulnerabilities lie, or even that they exist. The threats that you are unaware exist do not …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093250/lock-400x200.jpg)
Jon Callas: Encryption is a technology that rearranges power
In anticipation of his keynote at HITB Security Conference 2020 in Amsterdam, we talked to Jon Callas, a world-renowned cryptographer, software engineer, UX designer, and …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?