The proliferation of non-human identities

97% of non-human identities (NHIs) have excessive privileges, increasing unauthorized access and broadening the attack surface, according to Entro Security’s 2025 State of Non-Human Identities and Secrets in Cybersecurity report. 92% of organizat… Continue reading The proliferation of non-human identities

How to improve response to emerging cybersecurity threats

Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos featu… Continue reading How to improve response to emerging cybersecurity threats

Securing data at the intersection of the CISO and CDO

Two groups in particular play a key and critical role in ensuring data governance and security: the CISO and the CDO. CISOs are responsible for identifying and managing risks associated with data security, while CDOs are responsible for ensuring data a… Continue reading Securing data at the intersection of the CISO and CDO

How CISOs can improve security practices to keep up with evolving technologies

TikTok and Lensa AI have sparked worldwide conversations on the future of social media and consumer data privacy. In this Help Net Security video, Rick McElroy, Principal Security Strategist at VMware, offers a perspective on these trends, including ti… Continue reading How CISOs can improve security practices to keep up with evolving technologies

Enterprise security challenges and increased cloud usage fueled by remote work

81% of U.S.-based IT professionals believe that having remote workers has increased enterprise security challenges, while 74% acknowledge that their company’s use of cloud solutions increased as a direct result of the COVID-19 pandemic, a ManageEngine … Continue reading Enterprise security challenges and increased cloud usage fueled by remote work

Consumers are increasingly concerned about online security and imminent attacks

According to a new Sophos Home survey, forty-five percent of consumers say they’re more at risk of being hit by an attack now than they were before the pandemic, and 61% believe their household could be the target of an attack in the next year. Despite… Continue reading Consumers are increasingly concerned about online security and imminent attacks

Rebuilding your security culture as employees return to the office

The return to work allows security teams to refocus on areas of their insider risk management program that may have been swept under the rug while working remotely. As employees reunite for the first time in a long time, it’s a good opportunity for com… Continue reading Rebuilding your security culture as employees return to the office

It’s time for companies to take a hard look at how they manage secrets

Leaked infrastructure secrets – code, credentials and keys – which are exposed accidentally or intentionally cost companies an average of $1.2 million in revenue per year, according to a report from 1Password. The report explores how organi… Continue reading It’s time for companies to take a hard look at how they manage secrets

SolarWinds breach severity perception increasing over time

(ISC)² has published the results of an online survey of 303 cybersecurity professionals from around the globe in which respondents compared their perception of the severity of the SolarWinds Orion software breach between when it was first reported and … Continue reading SolarWinds breach severity perception increasing over time

Which security practices lead to best security outcomes?

A proactive technology refresh strategy and a well-integrated tech stack are, according to a recent Cisco report, two security practices that are more likely than many others to help organizations achieve goals such as keeping up with business, creatin… Continue reading Which security practices lead to best security outcomes?