Reimagining zero trust for modern SaaS

The concept of zero trust – as a way to improve the security of and access to an organization’s network, systems, and data – has gained traction in recent years. The basic premise is that no user or device should be trusted by default… Continue reading Reimagining zero trust for modern SaaS

The dangers of unsupported applications

Are ageing technologies and infrastructure threatening the security and productivity of your business? A recent investigation by the National Audit Office (NAO – UK’s independent public spending watchdog) revealed that the Department for Environm… Continue reading The dangers of unsupported applications

Establishing secure habits for software development in 2023

As a new year commences, it’s not unusual for people to take the opportunity to adopt better practices and principles and embrace new ways of thinking in both their personal and professional lives. Software development teams always strive to master the… Continue reading Establishing secure habits for software development in 2023

How CISOs can improve security practices to keep up with evolving technologies

TikTok and Lensa AI have sparked worldwide conversations on the future of social media and consumer data privacy. In this Help Net Security video, Rick McElroy, Principal Security Strategist at VMware, offers a perspective on these trends, including ti… Continue reading How CISOs can improve security practices to keep up with evolving technologies

Inadequate cybersecurity investments leave rail industry at risk

The popular notion might view the rail industry as a laggard compared to auto or high-tech manufacturing when embracing Industry 4.0. Yet railways are increasingly dependent on sophisticated connected systems to enhance efficiency and customer satisfac… Continue reading Inadequate cybersecurity investments leave rail industry at risk

Top 3 resolutions for security teams

As 2023 goals become solidified, companies need to decide how they are prioritizing cybersecurity. It’s time to focus on what organizations can prioritize. In this Help Net Security video, Kevin Garrett, Senior Solutions Engineer at Censys, recom… Continue reading Top 3 resolutions for security teams

Balancing risk and security tradeoffs

In this Help Net Security video, Christopher Hodson, CSO at Cyberhaven, talks about how CISOs have been investing in inflating their tech stack, but for what? No amount of acronyms will do any good if stuff is leaking from within. Classifying files and… Continue reading Balancing risk and security tradeoffs

While governments pass privacy laws, companies struggle to change

Government agencies keep making new privacy rules while end users fall victim to malpractice and scams. Bill Tolson, VP of Compliance and eDiscovery at Archive360, has spent many years consulting with regulators and advising businesses on concrete step… Continue reading While governments pass privacy laws, companies struggle to change

Short-staffed SOCs struggle to gain visibility into cloud activities

Enterprises have a limited number of analysts running their security operations centers (SOCs) and are deploying multiple tools in an attempt to address their cloud security challenges, according to ManageEngine. According to Gartner, 85% of organizati… Continue reading Short-staffed SOCs struggle to gain visibility into cloud activities

Hybrid cloud storage security challenges

Companies are challenged with more complex hybrid IT environments. They are raising budgets to fend off cyberattacks and keep up as production environments continue to diversify across various clouds, according to Veeam Software. While organizations of… Continue reading Hybrid cloud storage security challenges