Please turn on your JavaScript for this page to function normally.
2FA 3FA MFA
2FA, 3FA, MFA… What does it all mean?

Simply put, authentication is the act of proving you are who you say you are. To gain access to protected information, systems or locations, the user must prove their identity …

data
The security dilemma of data sprawl

As hybrid work becomes the norm in business, so does data sprawl. Data sprawl refers to the spread of company information to various places, which often comes from dispersed …

USA
Privacy, compliance challenges businesses face after Roe v. Wade repeal

In this Help Net Security video, Rebecca Herold, IEEE member and CEO of Privacy & Security Brainiacs, discusses data, privacy, surveillance, and compliance challenges …

lock
What consumers expect from organizations that handle their personal data

In this Help Net Security video, Robert Waitman, Privacy Director and Head of Privacy Research Program at Cisco, discusses the key findings of Cisco’s 2022 Consumer …

data
The companies most likely to lose your data

Web companies are most likely to lose your data, a study shows. The study, conducted by VPN Overview, analysed major data breaches that have been registered since 2004 to …

iDealwine
iDealwine suffers a data breach

Popular international fine wine online retailer iDealwine has suffered a data breach during the past weekend, and has yet to reveal the number of customers affected. Its …

hands
3 mistakes organizations make when trying to manage data securely

Data security is complex. With each day, there is an increase in data volume, data type, and data source or storage. Yet, despite all of the technological advancements in this …

healthcare
Cost-effective steps healthcare CISOs can take to mitigate damaging attacks

Cybersecurity measures are increasingly failing to close gaps, and the healthcare industry, in particular, has become a high-dollar target due to limited budgets and quick …

identity theft
Consumers want more transparency on how companies manage their data

Cisco published its 2022 Consumer Privacy Survey, an annual global review of consumers’ perceptions and behaviors on data privacy, highlighting the critical need for further …

complex
Purpose-based access control: Putting data access requests into context

Access control is the heart of data protection. Striking the right balance between easy access and tight security isn’t easy, but getting it right is how you maintain business …

Microsoft Teams
Microsoft Teams: A channel for sensitive business information sharing that needs better backup

Hornetsecurity has found an urgent need for greater backup for Microsoft Teams with 45% of users sending confidential and critical information frequently via the platform. …

face
The gap between security and privacy, and what it will take to bridge it

In this Help Net Security video, Bill Tolson, VP of eDiscovery & Compliance at Archive360, talks about the biggest and perhaps only question in information governance …

Don't miss

Cybersecurity news