![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092947/lock-400x200.jpg)
Password reuse defeats the purpose of passwords
When a person reuses the same password across multiple accounts, one account’s exposure puts all the others at risk. To prevent this, cybersecurity awareness programs must …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
Why data privacy will be the catalyst for digital identity adoption
Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Alarming number of consumers impacted by identity theft, application fraud and account takeover
A new report, developed by Aite Group, and underwritten by GIACT, uncovers the striking pervasiveness of identity theft perpetrated against U.S. consumers and tracks shifts in …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
How digital leaders built a foundation for resiliency in the face of disruption
During the past year, digital leaders deployed a remote workforce, engaged customers via contactless delivery and weathered various business disruptions throughout the year. …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
A strategic approach to identity verification helps combat financial crime
70% of financial services organizations are taking a strategic approach to identity verification to combat financial crime and stay one step ahead of fraudsters according to …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094612/week_in_review1-400x200.jpg)
Week in review: Keeping serverless architecture secure, trends influencing remote work in 2021
Here’s an overview of some of last week’s most interesting news and articles: March 2021 Patch Tuesday: Microsoft fixes yet another actively exploited IE zero-day …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02103956/back-up-data-400x200.jpg)
Two new ways backup can protect enterprise SaaS data
Software-as-a-Service (SaaS) apps are a treasure trove of information. They’re where business takes place and decisions get made, so it’s not surprising that they’re …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095742/data-400x200.jpg)
Compromised devices and data protection: Be prepared or else
The January 6 riot and storming of the U.S. Capitol demonstrated just how quickly and unexpectedly our devices can fall into the wrong hands. The allegation that one rioter …
![remote workforce protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/08091029/remote_workforce_protection2-400x200.jpg)
Rise in remote work leads to increase in IT security gaps
Companies have not done enough to prevent heightened security risk in light of remote working, according to Lynx Software. In fact, 36% have been, or know someone who has …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
Can private data be recovered from “sanitized” images?
Machine learning systems are becoming pervasive not only in technologies affecting our day-to-day lives, but also in those observing them, including face expression …
![search](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/16143539/search-look-400x200.jpg)
Most IT pros manage different versions of the same database
The vast majority (82%) of IT professionals admit that they manage different versions of the same database, and 74.4% run into issues with their current data warehouses, …
![Eugene Dzihanau](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/26142018/eugene_dzihanau_2-epam-400x200.jpg)
Getting your application security program off the ground
IT and security professionals are increasingly concerned about attackers compromising their mission-critical applications. According to a recent Ponemon study, the reasons for …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about