Please turn on your JavaScript for this page to function normally.
cloud binary
Collaboration is key for cloud innovation

Developers and security professionals work in very different ways. While the former is likely to move and innovate fast – with quick coding and rapid application building a …

zero
The importance of compute lifecycle assurance in a zero-trust world

With the proliferation of attack surfaces in IoT, the increase in firmware-based attacks on hardware, and growing threats to systems throughout their lifecycle, companies are …

Crime-as-a-Service
With Crime-as-a-Service, anyone can be an attacker

Crime-as-a-Service (CaaS) is the practice of experienced cybercriminals selling access to the tools and knowledge needed to execute cybercrime – in particular, it’s often used …

application
A digital shift requires a new approach to asset management: How to reduce security risks

The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed …

CWE Top 25
A look at the 2021 CWE Top 25 most dangerous software weaknesses

The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two …

world
Navigating the 2021 threat landscape: Security operations, cybersecurity maturity

Ransomware attacks have been increasingly in the headlines, and reaching historic levels of impact. Findings from a new report from ISACA in partnership with HCL Technologies …

remote workforce protection
Organizations still rely on weak security for remote workers

A new survey of enterprise IT security leaders showed almost 80 percent believe remote workers are at more risk for phishing attacks now because they’re isolated from …

zero trust
Retailers turn to zero trust to keep consumers and employees secure

Retailers have not only had to contend with the business disruption resulting from the COVID-19 pandemic, but they have also experienced increased security risks in the …

question
Engaging with governments is a data security priority

Global tax systems are responsible for handling and storing vast amounts of data. Whether it’s details of a supplier’s transactions with its customers, or personal financial …

SD-WAN
What should IT leaders look for in an SD-WAN solution?

The phrase “game-changing” has become almost overused in recent years, particularly in the world of tech. To an extent, this reflects the degree of constant innovation taking …

Healthcare
Curious to see how healthcare cybersecurity fared this year?

Most hospitals critically lack the ability to secure their supply chain systems, according to CynergisTek. In a new report, CynergisTek reviewed just under 100 assessments of …

How can secure KVM technology help eliminate security risks?

John Minasyan leads Belkin’s cybersecurity business unit focused on solutions to mitigate advanced threats at an operator’s desk. In this conversation with Help Net Security, …

Don't miss

Cybersecurity news