Please turn on your JavaScript for this page to function normally.
Terminal
68% of IT leaders are worried about API sprawl

Axway announced new data from its inaugural 2022 Open Everything Strategy Survey Report, which found that nearly 40% of organizations are in the process of adopting a new …

thief
How an effective fraud prevention strategy can force fraudsters to invest more in their attacks

Since the early stages of the pandemic, account takeover fraud (ATO) has significantly transformed, quickly becoming one of the fastest-growing cybersecurity threats with 22% …

hands
How cloud PCs act as an insurance plan for ransomware recovery

Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention …

CISA free resources
5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and …

cloud
Cybersecurity implications of using public cloud platforms

According to a recent Node4 report, IT managers have a generally positive view of public cloud platforms. Half of the respondents said that, despite benefits, they have had to …

bot
Robotic Process Automation (RPA) adoption hindered by security concerns

Robotic Process Automation (RPA) promises numerous benefits to organizations investing in it, including increased worker productivity, the automation of tedious and monotonous …

cloud hand
Cloud data protection trends you need to be aware of

Veeam Software released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), …

Sami Khoury
As trust in online spaces degrades, Canada bolsters resilience against cyber attacks

In this Help Net Security interview, Sami Khoury, Head of the Canadian Centre for Cyber Security, talks about how Canada is addressing today’s top threats, touches upon …

chess
Creating a holistic ransomware strategy

Recent scientific research into the psychological effects of a ransomware crisis on both organizations and individuals revealed the deep marks that a ransomware crisis leaves …

identity theft
Personal cybersecurity is now a company problem

As work and personal lives have almost merged into one, threat actors are increasingly targeting people because of their work lives, and cybersecurity needs to adapt to the …

compliance
Compliance initiatives can advance your organization’s security journey

Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at …

lock
Active security budget evaluation plugs holes in your security stack

Every successful attack has breached the security stack. Once the foundation of good cybersecurity, firewalls, and other security products are not enough to block all of the …

Don't miss

Cybersecurity news