Please turn on your JavaScript for this page to function normally.
hands
How to secure microservices using authorization

IT organizations looking to continue their digital transformation journey are faced with a choice – choosing between a more cost-effective, simple monolithic system or a more …

deepfakes
Deepfakes: What they are and how to spot them

The term “deepfake” is used for photo, video or audio content that has been manipulated to make it seem that the subject is doing or saying something they never did or said. …

architecture
AI can help you optimize your supply chain

There are three key questions concerning artificial intelligence (AI) in the supply chain: Where are we today and what are some of the tailwinds driving the implementation of …

shield
Security stack consolidation helps CISOs lower cybersecurity spending

In this Help Net Security video, Alfredo Hickman, Head of Information Security at Obsidian Security, discusses the importance of security stack consolidation for organizations …

lock
Cybersecurity pros opine on the future of security

Trellix released global research revealing the cost of siloed security, weak spots in protection, and lack of confidence amongst security operations teams. This Help Net …

college
Educational institutions must reverse their backward approach to cyber defense

As schools have become more digital, they’ve taken a somewhat backward approach to cybersecurity, historically moving slowly, and have weak cybersecurity controls and …

search
The dangers of orphaned data and what companies can do about it

Orphaned data is data that still sits on an organization’s network but was created and owned by a now deactivated employee. In this Help Net Security video, Carl …

ransomware
Fear of cybercriminals drives cybersecurity improvements

Fortifying cybersecurity defenses remains a work in progress for many organizations, who acknowledge their shortcomings but have yet to commit the necessary resources to the …

healthcare
Cost-effective steps healthcare CISOs can take to mitigate damaging attacks

Cybersecurity measures are increasingly failing to close gaps, and the healthcare industry, in particular, has become a high-dollar target due to limited budgets and quick …

RSAC
New RSA Conference CEO talks about delivering value

Kylie Wright-Ford was recently named CEO of RSA Conference LLC. She joins RSAC with an extensive track record of building communities for business professionals, having served …

ransomware
Why paying the ransom is a mistake

New research from Databarracks reveals 44% of organizations that suffered a ransomware attack, paid the ransom. 34% recovered from backups, while 22% used ransomware …

Woman working on laptop
How to improve employees’ cybersecurity behavior

We already have cybersecurity behaviors we learned from elsewhere, especially those who have grown up with technology. Initially, cybersecurity starts from home and school, …

Don't miss

Cybersecurity news