How CISOs navigate security and compliance in a multi-cloud world
Due to the increasing importance of multi-cloud and the intricate nature of cloud infrastructure, obtaining a comprehensive understanding of the various cloud workloads …
How companies are struggling to build and run effective cybersecurity programs
A recent Code42 report reveals a rapidly growing number of inside risk incidents and a concerning lack of training and technology, further exacerbated by increasing workforce …
Ransomware reinfection and its impact on businesses
Destructive ransomware attacks impact enterprises, governments, airlines, hospitals, hotels, and individuals, causing widespread system downtime, economic loss, and …
Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes
In this Help Net Security video, Michael Peters, Principal Software Engineer at Red Hat, discusses how to implement a zero-trust system that uses workload identity across a …
Tactics that make crypto giveaway scams so successful
The illicit market for crypto giveaway scams has expanded, offering various services to facilitate fraudulent activity. The proliferation of fake crypto giveaways can be …
How airlines can embrace IT system modernization
Recent travel meltdowns at Southwest Airlines and the FAA have exposed our dependence on fragile, outdated, or unreliable computer systems. Institutional failures have made …
Leveraging network automation to enhance network security
Data backups get a lot of attention, but sadly, sometimes, the operational work that keeps networks secure – like device backups, upgrades, and configuration grooming – goes …
The rise of biometrics and decentralized identity is a game-changer for identity verification
The journey towards digital transformation for organizations and governments has been fraught with difficulties, resulting in some users needing to catch up as more digital …
How cybersecurity decision-makers perceive cyber resilience
In an economic climate putting immense pressure on business leaders to prove ROI and team efficiency – a new report from Immersive Labs looks into the lack of confidence …
Running a security program before your first security hire
In this Help Net Security video, Matt Spitz, Head of Engineering at Vanta, talks about pragmatic security and illustrates what a small company with limited resources needs to …
Prioritizing data security amid workforce disruptions
Businesses have faced massive disruptions in their workforce – many are requesting employees return to the office, and layoffs are rattling several industries. This disruption …
Why organizations shouldn’t fold to cybercriminal requests
Organizations worldwide pay ransomware fees instead of implementing solutions to protect themselves. The ransom is just the tip of the iceberg regarding the damage a …