Robotic Process Automation (RPA) adoption hindered by security concerns

Robotic Process Automation (RPA) promises numerous benefits to organizations investing in it, including increased worker productivity, the automation of tedious and monotonous tasks, and improved efficiency. According to Deloitte, it’s a market that wi… Continue reading Robotic Process Automation (RPA) adoption hindered by security concerns

Cloud data protection trends you need to be aware of

Veeam Software released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Backup and Disast… Continue reading Cloud data protection trends you need to be aware of

As trust in online spaces degrades, Canada bolsters resilience against cyber attacks

In this Help Net Security interview, Sami Khoury, Head of the Canadian Centre for Cyber Security, talks about how Canada is addressing today’s top threats, touches upon his long career and offers tips for those new to the industry. What are today… Continue reading As trust in online spaces degrades, Canada bolsters resilience against cyber attacks

Personal cybersecurity is now a company problem

As work and personal lives have almost merged into one, threat actors are increasingly targeting people because of their work lives, and cybersecurity needs to adapt to the new reality. In this Help Net Security video, Amir Targighat, CEO at Agency, di… Continue reading Personal cybersecurity is now a company problem

Compliance initiatives can advance your organization’s security journey

Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at least a minimal set of security controls. In this Help Net Security video, Chri… Continue reading Compliance initiatives can advance your organization’s security journey

Active security budget evaluation plugs holes in your security stack

Every successful attack has breached the security stack. Once the foundation of good cybersecurity, firewalls, and other security products are not enough to block all of the sophisticated attacks that are being used by today’s attackers. In this … Continue reading Active security budget evaluation plugs holes in your security stack

How to assess and mitigate complex supply chain risks

As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions and services as well as third-party service providers, software supply chain… Continue reading How to assess and mitigate complex supply chain risks

Taking cybersecurity investments to the next level

Recently, the Forgepoint team announced a new alliance with global banking leader Santander to increase cyber investment worldwide, specifically in Europe, Israel, and Latin America. Santander will also be the primary investor in Forgepoint’s next fund… Continue reading Taking cybersecurity investments to the next level

Top 4 priorities for cloud data protection

Recent BigID research found that 86% of organizations use multiple cloud platforms to store their data- across IaaS, PaaS, and SaaS. As the reliance on cloud services continues to scale and malicious actors continue to evolve, it’s critical to get a ho… Continue reading Top 4 priorities for cloud data protection