Strong passwords still a priority strategy for enterprises

Bitwarden announced the results of a global survey of enterprise security decision makers, conducted by 451 Research, which explores enterprise password management practices and intent. Overall, the survey finds that strong passwords remain a priority … Continue reading Strong passwords still a priority strategy for enterprises

How organizations can protect themselves in the emerging risk landscape

In this video for Help Net Security, Ravi Srinivasan, CEO of Votiro, discusses ThoughtLab’s 2022 cybersecurity benchmarking study, Cybersecurity Solutions for a Riskier World. The research revealed that the pandemic has brought cybersecurity to a… Continue reading How organizations can protect themselves in the emerging risk landscape

API security warrants its own specific solution

Application programming interfaces (APIs) enable developers to quickly and easily roll-out services but they’re also equally attractive to attackers. This is because they can provide ready access to back-end systems and sensitive data sets. What makes … Continue reading API security warrants its own specific solution

Top three most critical areas of web security

Akamai Technologies revealed three research reports at the RSA Conference 2022, focusing on three of the most critical areas of web security: ransomware, web applications and APIs, and DNS traffic. Analyzing trillions of data points across its multiple… Continue reading Top three most critical areas of web security

Barely one-third of IT pros can vet code for tampering

Global research commissioned by ReversingLabs and conducted by Dimensional Research, revealed that software development teams are increasingly concerned about supply chain attacks and tampering, but barely a third said they can effectively vet the secu… Continue reading Barely one-third of IT pros can vet code for tampering

Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level

In this interview for Help Net Security, Mehul Revankar, VP of Product Management & Engineering for VMDR at Qualys, talks about Qualys Vulnerability Management, Detection and Response (VMDR) 2.0 with TruRisk. The solution gives unprecedented insig… Continue reading Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level

Intelligence is key to strategic business decisions

Businesses have a growing need for greater relevance in the intelligence they use to inform critical decision-making. Currently just 18% of professionals responsible for security, risk, or compliance in their organization feel that the intelligence the… Continue reading Intelligence is key to strategic business decisions

Massive shadow code risk for world’s largest businesses

Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply chains of major business websites. This risk, originating from highly dynamic … Continue reading Massive shadow code risk for world’s largest businesses

There is no good digital transformation without cybersecurity

Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. According to a research commissioned by Opengear, 53% of network engineers a… Continue reading There is no good digital transformation without cybersecurity

Moving toward a more adaptable and tech-driven compliance function

A growing global regulatory focus on consumer privacy and data protection, along with new sustainability measurement and reporting laws is furthering the importance of compliance in supporting operational and environmental resilience. Such a shift is r… Continue reading Moving toward a more adaptable and tech-driven compliance function