Please turn on your JavaScript for this page to function normally.
Face
Insider attacks still far more difficult to detect and prevent than external cyber attacks

A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a …

iPhone
Most organizations plan to adopt new authentication solutions within two years

Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …

zero
Trust dimensions in zero trust security

The increasing sophistication of cyberattacks and subsequent costs associated with containment and remediation has brought about an evolution in the security industry. …

building blocks
Migrations represent the number one challenge for database professionals

Migrations are now the number one priority for database professionals, a new Redgate report reveals. Cloud usage is on the up, for example, with 44% of organizations now using …

connection
To benefit from DevOps implementation, security and dev teams must communicate better

Despite the enterprise benefits assured by adopting a DevOps culture, the majority of IT leaders believe communication between IT security and software development must …

communication
Cybersecurity crisis communication: How to do it well

Riviera Beach is one of the several cities and towns in Florida which have recently been hit with ransomware. Its local government, like that of Lake City before it, decided …

Wandera
Protect privacy and provide secure mobile access to corporate data

In this Help Net Security podcast, Mike Campin, VP of Engineering at Wandera, talks about how their solution solves a problem that every business is facing today, which is how …

password
The art and science of password hashing

The recent FlipBoard breach shines a spotlight again on password security and the need for organizations to be more vigilant. Password storage is a critical area where …

cloud
Eliminating fragmentation unlocks opportunities to realize the promise of the cloud

A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 …

Binary
Business security in the age of malicious bots

As most technologies, bots can be used for good and bad purposes, and the information security industry is doing its best to minimize the adverse effects of the latter …

hospital
How the healthcare industry can improve online trust

Privacy on the internet is important in all industries, but none more so than the healthcare sector, which handles mass amounts of online health data daily. While any data …

people
Bringing more talented individuals into the security industry

In this interview, Tony Vizza, Director of Cybersecurity Advocacy, Asia-Pacific, (ISC)2, talks about the growing information security skills shortage, the importance of …

Don't miss

Cybersecurity news