Please turn on your JavaScript for this page to function normally.
Terminal
Why low-code and identity must co-exist

Software development has emerged as a critical task for organizations looking to compete in the digital economy. It increasingly fuels innovation and even disruption. Yet, …

virtual reality
Extended Threat Intelligence: A new approach to old school threat intelligence

The world is shaken by different new crises and cyber events every day. All sectors are affected by the events, either in terms of production, transportation, or security. The …

risk
How will recent risk trends shape the future of GRC

Risk management has never been more critical to organizations. The rate of change is happening faster than ever in our world. The kinds of risks facing organizations evolve …

lock
Strengthening third-party vendor programs in times of crisis and beyond

The ongoing global turmoil has tested the supply chain across industries in a myriad of ways – from strained resources and remote workflows to security concerns and more. …

businessman
Companies should evolve their cybersecurity strategy in light of the Great Resignation

While the obvious challenge of the Great Resignation is rising labor shortages, the phenomenon is now posing a critical risk to another important aspect of the workforce: …

businessman
Three steps to secure an organization during mergers and acquisitions

Since 2000, there have been over 790,000 merger and acquisition (M&A) transactions announced globally, consisting of a value over 57 trillion dollars. While these …

DevOps
Securing DevOps amid digital transformation

There are always new buzzwords/phrases being bandied about. In the late 1990s it was “long tail of the Internet” and “new paradigms”. Then there was this new thing referred to …

zero
The not so scary truth about zero-day exploits

We don’t know what we don’t know; this is the quintessential problem plaguing security teams and the primary reason that zero-day exploits can cause such damage. …

AI
Why machine identities matter (and how to use them)

The migration of everything to the cloud and corresponding rise of cyberattacks, ransomware, identity theft and digital fraud make clear that secure access to computer systems …

red teaming
Cybersecurity Red Team 101

“Red Team” is an expression coined in the 19th century, related to German military preparedness exercises conducted as realistic board games between two adversaries operating …

Den Jones
How to become a passwordless organization

In this interview with Help Net Security, Den Jones, CSO at Banyan Security, explains the benefits of implementing passwordless authentication and the process every …

endpoint protection
Why EDR is not sufficient to protect your organization

Endpoint detection and response (EDR) tools are a cornerstone of most cybersecurity defenses today. But while the technology has an important role to play in investigating …

Don't miss

Cybersecurity news