strategy
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101119/zero-400x200.jpg)
The Goldilocks principle for zero trust fraud prevention
According to Wikipedia, “zero trust is an information security framework which states that organizations should not trust any entity inside or outside of their perimeter at …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102340/face2-400x200.jpg)
How can we harness human bias to have a more positive impact on cybersecurity awareness?
Dr. Jessica Barker, Co-CEO of Cygenta, follows her passion of positively influencing cybersecurity awareness, behaviours and culture in organisations around the world. Dr. …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
HECVAT toolkit helps higher education institutions assess cloud adoption risks
Higher education institutions are increasingly adopting cloud-based solutions in order to lower costs, improve performance and productivity, and increase flexibility and …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
How CISOs can justify cybersecurity purchases
Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093230/shield2-400x200.jpg)
What makes some organizations more cyber resilient than others?
Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160247/email-smoke-red-400x200.jpg)
Layering diverse defenses is crucial for stopping email attacks
Despite heading a company that provides a technological solution for stopping targeted email attacks, Evan Reiser, CEO of Abnormal Security, knows that technology is not the …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/02112425/vault-pattern2-400x200.jpg)
Three principles regarding encryption you need to keep in mind
Encryption is a popular topic among security professionals and occasionally a polarizing one. Plenty of misconceptions surround the process, and these often skew the way …
![plan](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102453/plan-400x200.jpeg)
How to prioritize IT security projects
If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101705/cloud-400x200.jpg)
Organizational culture defines a successful cloud strategy
61% of organizations in the U.S. and Canada are committed to moving enterprise applications to the cloud as quickly as possible, but many struggle with challenges related to …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101141/tools2-400x200.jpg)
Tech pros should consider modern APM tools to gain insight across the entire application stack
While application performance management (APM) has become mainstream with a majority of tech pros using APM tools regularly, there’s work to be done to move beyond …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
2020: A year of deepfakes and deep deception
Over the past year, deepfakes, a machine learning model that is used to create realistic yet fake or manipulated audio and video, started making headlines as a major emerging …
![secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111740/secure-400x200.jpg)
Data breach: Why it’s time to adopt a risk-based approach to cybersecurity
The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?