Most organizations plan to adopt new authentication solutions within two years
Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …
How companies innovate as they face industry disruption
Nearly three-quarters (72%) of industry sectors experienced an increase in disruption over the past eight years, leaving $41 trillion in enterprise value (market …
Week in review: The art and science of password hashing, cybersecurity crisis comms
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Bringing more talented individuals into the security industry In this interview, Tony …
Trust dimensions in zero trust security
The increasing sophistication of cyberattacks and subsequent costs associated with containment and remediation has brought about an evolution in the security industry. …
Migrations represent the number one challenge for database professionals
Migrations are now the number one priority for database professionals, a new Redgate report reveals. Cloud usage is on the up, for example, with 44% of organizations now using …
To benefit from DevOps implementation, security and dev teams must communicate better
Despite the enterprise benefits assured by adopting a DevOps culture, the majority of IT leaders believe communication between IT security and software development must …
Disaster recovery readiness is essential for hybrid and multi-cloud strategies
Disaster recovery capability is a key factor in implementing hybrid and multi-cloud strategy, a new Teradici study reveals. Of the respondents who had implemented a hybrid or …
Cybersecurity crisis communication: How to do it well
Riviera Beach is one of the several cities and towns in Florida which have recently been hit with ransomware. Its local government, like that of Lake City before it, decided …
Protect privacy and provide secure mobile access to corporate data
In this Help Net Security podcast, Mike Campin, VP of Engineering at Wandera, talks about how their solution solves a problem that every business is facing today, which is how …
The art and science of password hashing
The recent FlipBoard breach shines a spotlight again on password security and the need for organizations to be more vigilant. Password storage is a critical area where …
Eliminating fragmentation unlocks opportunities to realize the promise of the cloud
A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 …
To remain competitive, businesses need strategic digital transformation
With no international alignment on how to regulate the digital environment, companies are managing an increasingly complicated set of conflicting rules in key markets. At the …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!