Help Net Security

Hybrid IAM: Addressing the security and experience issues caused by hybrid IT
More than 80% of global IT decision-makers have already adopted, or plan to adopt or expand, cloud-based identity and access management (IAM) initiatives over the next two …

Board directors need to play an active role in protecting their org from cyber risks
Cybersecurity failure is a “clear and present danger” and critical global threat, yet responses from board directors have been fragmented, risks not fully understood, and …

How to avoid 4 common zero trust traps (including one that could cost you your job)
Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …

93% of consumers concerned about data security when filling out online forms
Source Defense provides in-depth analysis of the client-side threat landscape and specific attacks like formjacking, Magecart and web browser threats. The research offers a …

How well have remote workers adapted one year on?
Remote workers are still struggling with distracting working environments, stress and an ‘always-on’ culture after a year of working from home, an Egress research has …

How much of the data created and replicated should be stored?
The amount of data created and replicated experienced unusually high growth in 2020 due to the dramatic increase in the number of people working, learning, and entertaining …

Leaders need to find ways to increase internal audit capacity without increasing budgets
A study of 299 internal audit organizations showed that the function faced both declining budgets and a significantly expanded workload in 2020, according to Gartner. “For …

Stop using your employees as scapegoats: Change their behavior
Remote workforces pose new challenges for organizations, with the largest issue centered around fortifying the security of at-home workers. We’ve recently witnessed large …

Why certificate automation is no longer just “nice to have”
We’ve all heard the shocking stories about the outages at what should have been bullet-proof organizations like Microsoft, Spotify, and a California Covid-19 testing …

The importance of a zero trust-based approach to identity security
97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials, a CyberArk survey reveals. As organizations move …

As DX acceleration continues, identity and zero trust need to be central in all business decisions
The pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and zero trust security, …

Data center market size to reach $519.34 billion by 2025
The data center market research from Technavio indicates neutral growth in the short term as the business impact of COVID-19 spreads. Data center market size by 2025 …
Featured news
Resources
Don't miss
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management
- Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)