strategy
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Can zero trust kill our need to talk about locations?
As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/17172120/lock-green-connect-400x200.jpg)
The state of AppSec and the journey to DevSecOps
While the perceived benefits of DevSecOps to both security and DevOps are high, much progress must be made in defining a repeatable and consistent governance model for true …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/17081348/table-idea-400x200.jpg)
Three smart ways SMBs can improve cybersecurity
Most of us wouldn’t automatically equate small to medium-size businesses (SMBs) with having the most stringent security strategies. For starters, they don’t exactly operate …
![Woman working on laptop](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095739/woman-laptop-400x200.jpg)
C-level cybersecurity attitudes as enterprises embrace the everywhere workplace
Ivanti unveiled the findings of a Frost & Sullivan study which investigates the impact of the COVID-19 pandemic on cybersecurity and compliance attitudes and behaviors in …
![passwordless](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/19132738/passwordless-400x200.jpg)
Why passwordless is not always passwordless
The concept of passwordless authentication has been gathering steam. Gartner anticipates that by 2022, 60% of large and global enterprises will implement some sort of …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/18150523/hands-data-security-400x200.jpg)
Application level data protection hindered by misperceptions and complexities
Companies plan to take extensive actions in the next 12 months to address a broad concern for sensitive data being unprotected in use at the application layer, Entrust and …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27090527/ransomware-yellow-400x200.jpg)
How to deal with ransomware attacks
Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help …
![climb](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100634/climb-400x200.jpg)
Enterprise leaders now see cybersecurity as a business advantage
Enterprise leaders who previously viewed cybersecurity as part of traditional infrastructure have shifted to rapidly invest in integrated, cloud-based approaches, with ripple …
![pipeline biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/11203847/pipeline_biohazard-400x200.jpg)
What the pipeline attack means for critical infrastructures
The big news in critical infrastructure security is the ransomware-triggered shutdown of the Colonial gasoline pipeline – the largest such pipeline in the USA. The …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
Top concerns for IT leaders planning for hybrid workplace environments
Employee engagement (56%), burnout (53%), and reduced productivity (52%) are top concerns for IT leaders in 2021 and beyond, as they continue to enable remote workers and plan …
![Salesforce](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/08142813/salesforce-400x200.jpg)
Acting on a security risk assessment of your organization’s use of Salesforce
Salesforce isn’t rocket science, but the software has an incredible array of tools, which is why securing it demands a unique (and sometimes complex) approach. If you’re …
![PKI](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092952/pki-400x200.jpg)
Dispelling four myths about automating PKI certificate lifecycle management
The public key infrastructure (PKI) underpins the most effective strategy for securing communications between machines, network and mobile devices, virtual servers, and the …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history