Please turn on your JavaScript for this page to function normally.
IoT connection
Your supply chain: How and why network security and infrastructure matter

With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …

automate
Automation investments are driving revenue, productivity and employment

SnapLogic and the Centre for Economics and Business Research (Cebr) released a research into the economic impact of automation. The study looks at the growing adoption of …

businessman
Does your company employ a CISO? Many are operating without security leadership

45% of companies do not employ a Chief Information Security Officer (CISO), a Navisite research found. Of this group, 58% think their company should hire a CISO. Only 40% of …

quantum
The CIS Benchmarks community consensus process

The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security guidance. The first CIS …

Demi Ben-Ari
How to handle third-party security risk management

In this Help Net Security interview, Demi Ben-Ari, CTO at Panorays, talks about third-party security risk management and the repercussions of a third-party breach. He also …

How to improve your SaaS security posture and reduce risk

In this Help Net Security interview, Maor Bin, CEO at Adaptive Shield, talks about the SaaS security space and how Adaptive Shield help security teams gain control over their …

fire
Combating cybercrime: Lessons from a CIO and Marine veteran

A colleague asked me recently if I thought the FBI had finally experienced enough of the cyberattacks plaguing the United States and would now more aggressively pursue the …

see
We need a Cyber Awareness Century

For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …

zero
Operational technology and zero trust

Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …

Shark
When cybersecurity becomes terrifying

Some cybersecurity horror stories are not your typical horror stories: there’s no danger from a chainsaw-wielding maniac hiding behind a server rack, the Candyman won’t appear …

connection
The future of digital infrastructure: Top 10 predictions

IDC’s top 10 predictions for the future of digital infrastructure point to a digital infrastructure strategy that addresses resiliency and trust; data-driven operational …

lock
Security standards should be strengthened outside the federal government too

Tripwire announced the results of a research report that evaluated actions taken by the federal government to improve cybersecurity in 2021. Conducted by Dimensional Research, …

Don't miss

Cybersecurity news