Please turn on your JavaScript for this page to function normally.
cloud complexity
How to build a zero-trust cloud data architecture

Cloud computing has had a profound impact on CISOs. They realize its cheap storage, immense scalability, resource elasticity and accessibility from anywhere in the world, at …

AWS
AWS S3 can be a security risk for your business

Along with the shift to the cloud and emergence of modern digital services and applications, new security concerns have emerged for organizations. More connectivity means more …

cloud binary
Collaboration is key for cloud innovation

Developers and security professionals work in very different ways. While the former is likely to move and innovate fast – with quick coding and rapid application building a …

zero
The importance of compute lifecycle assurance in a zero-trust world

With the proliferation of attack surfaces in IoT, the increase in firmware-based attacks on hardware, and growing threats to systems throughout their lifecycle, companies are …

Crime-as-a-Service
With Crime-as-a-Service, anyone can be an attacker

Crime-as-a-Service (CaaS) is the practice of experienced cybercriminals selling access to the tools and knowledge needed to execute cybercrime – in particular, it’s often used …

chess
Gamification can redefine the cybersecurity demo experience

Lead generation is the easy part of the sales cycle. Marketing activities, sales enablement tools, events, and so on should create the perfect environment that allows sales …

application
A digital shift requires a new approach to asset management: How to reduce security risks

The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed …

cloud
Why isn’t cloud backup part of common security practices?

The threat of ransomware is omnipresent, and the tactics deployed by cybercriminals are constantly evolving to wreak as much havoc as possible. Recent attacks like the one on …

question
Engaging with governments is a data security priority

Global tax systems are responsible for handling and storing vast amounts of data. Whether it’s details of a supplier’s transactions with its customers, or personal financial …

SD-WAN
What should IT leaders look for in an SD-WAN solution?

The phrase “game-changing” has become almost overused in recent years, particularly in the world of tech. To an extent, this reflects the degree of constant innovation taking …

How can secure KVM technology help eliminate security risks?

John Minasyan leads Belkin’s cybersecurity business unit focused on solutions to mitigate advanced threats at an operator’s desk. In this conversation with Help Net Security, …

Rick Driggers
Critical infrastructure pain points: The toughest challenges

Accenture Federal Services recently hired cybersecurity expert and former CISA executive, Rick Driggers. He brings more than 30 years of federal government and military …

Don't miss

Cybersecurity news