Please turn on your JavaScript for this page to function normally.
Oded Hareven
The importance of securing machine-to-machine and human-to-machine interaction

In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid …

cloud
Multicloud environment complexities putting digital transformation at risk

Dynatrace announced the findings of an independent global survey of 1,300 CIOs and senior IT practitioners involved in infrastructure management. The research reveals the …

Scott Laliberte
AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset

In this interview with Help Net Security, Scott Laliberte, Managing Director at Protiviti, talks about the implementation of AI and ML in cybersecurity programs, why this is a …

digital transformation
How the pandemic fueled enterprise digital transformation

The COVID-19 pandemic has accelerated enterprise digital transformation by three to five years as companies build IT ecosystems to enable growth, innovation and improved …

certificate
Enterprise PKI automation: The modern approach to certificate lifecycle management

Today’s modern enterprises face massive surges in the use of digital identities, both for machines, (servers, laptops and network devices) and for the humans who use them. In …

risk
Bridging the “front and back of the house”: A lesson in risk management

Between cloud proliferation, new tech infrastructure and tools and an increasingly distributed workforce, organizations are struggling to implement proper risk management …

identity theft
Preventing document fraud in a world built on digital trust

All digital markets are built on trust and that trust has been reduced to an algorithm driven by proof of identity, which currently remains heavily reliant on formal documents …

bot
Bots are stealing Christmas!

Kasada released new data on the latest fraud and malicious automation trends, revealing increased threats during the holidays; rising attacks by bots; and the discovery of a …

struggle
Valuing IT professionals to retain talent and reduce their stress

Keeping up with digital transformation (32%) and keeping talent in technical roles (26%) are the two biggest challenges organizations face today, an Ivanti survey of IT …

Magnify
Shifting security further left: DevSecOps becoming SecDevOps

Veracode has revealed usage data that demonstrates cybersecurity is becoming more automated and componentized in line with modern software architectures and development …

White House
The cybersecurity executive order is not all it’s cracked up to be

Seventy-two percent of federal cybersecurity leaders say the White House’s May 2021 Cybersecurity Executive Order (EO) addresses only a fraction of today’s cybersecurity …

shop online
Online shopping at risk: Mobile application and API cyber attacks at critical high

Protecting mobile applications and APIs against automated threats is a top priority for online commerce businesses, according to data from a study published by DataDome. …

Don't miss

Cybersecurity news