strategy
The quantum sea change: Navigating the impacts for cryptography
Professionals in cybersecurity and cryptography (and even non-IT executives) are hearing about the coming threat from quantum computing. It’s reaching the mainstream business …
Public-interest technology: Why companies should get involved
“For the last 15 or 20 years, anything Silicon Valley companies did was seemingly in the public interest, and society has encouraged that view until quite …
Protecting applications against DFA attacks
2001 was an exciting time for cryptography, as the new Advanced Encryption Standard (AES) specification was finalized, making a mathematically secure and performant encryption …
Network performance requirements grow in the era of 5G: Are your security processes ready?
The new generation of 5G cellular networks are beginning to be rolled out in leading countries like the U.S., bringing to life the promise of connecting everything from …
What happened to trust and transparency in cybersecurity?
Today, we need proactive security measures that protect the organization responsibly, mitigate risk, and adapt to an ever-changing world. This can only be truly achieved with …
IT managers can’t ignore endpoints because most cyberattacks start there
IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint …
The impact of spear phishing on organizations and how to combat this growing threat
In this Help Net Security podcast, Scott Olson, the VP of Product Marketing at iovation, talks about the impact of spear phishing, and offers practical suggestions on how to …
How can healthcare organizations remedy their cybersecurity ailments?
Cybersecurity is a constant concern for healthcare organizations, and the previous 12 months have done little to quell anxieties. In 2017, the Department of Health and Human …
Enterprise attitudes to cybersecurity: Strategies to balance risk and business acceleration
IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a …
Human behavior can be your biggest cybersecurity risk
Changes in user behavior are increasingly blurring the lines between personal and business. Trends like Bring Your Own Device (BYOD) and flexible working often mean that …
A strong security posture starts with application dependency mapping
More and more organizations are turning to an agile DevOps culture as part of an ongoing digital transformation to their business, moving from monolithic application …
How cloud storage providers can preempt cyber attacks with business continuity
Cloud storage is now an integral part of almost every enterprise infrastructure and, as a result, security has become one of the most crucial elements of any cloud storage …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd