data

Island Enterprise Browser: Intelligent security built into the browsing session

Island Enterprise Browser: Intelligent security built into the browsing session 05/07/2023 at 06:31 By Mirko Zorz In this Help Net Security interview, Mike Fey, CEO of Island, explains the differences between consumer browsers and the Island Enterprise Browser, how it protects organizations’ data, and how it uses contextual information to provide users with a safe […]

React to this headline:

Loading spinner

Island Enterprise Browser: Intelligent security built into the browsing session Read More »

IT leaders believe hybrid cloud solutions are the future of IT

IT leaders believe hybrid cloud solutions are the future of IT 04/07/2023 at 06:01 By Help Net Security IT leaders are losing sleep over improving overall IT performance (60%), data security (50%), process risk and compliance (46%), and the need to improve agility (41%), according to Rocket Software. To overcome these challenges, IT organizations are

React to this headline:

Loading spinner

IT leaders believe hybrid cloud solutions are the future of IT Read More »

Exploring the persistent threat of cyberattacks on healthcare

Exploring the persistent threat of cyberattacks on healthcare 26/06/2023 at 07:38 By Mirko Zorz In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts of cyberattacks on healthcare institutions and what healthcare providers can do to protect patients’ personal data and medical devices. Can you

React to this headline:

Loading spinner

Exploring the persistent threat of cyberattacks on healthcare Read More »

Goodbyes are difficult, IT offboarding processes make them harder

Goodbyes are difficult, IT offboarding processes make them harder 19/06/2023 at 07:32 By Help Net Security When employees, contractors and service providers leave an organization, they take with them knowledge, capabilities, and professional achievements. They should leave behind any proprietary or confidential data belonging to the organization, but Osterman Research found that 69% of organizations

React to this headline:

Loading spinner

Goodbyes are difficult, IT offboarding processes make them harder Read More »

Phishing campaigns thrive as evasive tactics outsmart conventional detection

Phishing campaigns thrive as evasive tactics outsmart conventional detection 01/06/2023 at 06:21 By Help Net Security A 25% increase in the use of phishing kits has been recorded in 2022, according to Group-IB. The key phishing trends observed are the increasing use of access control and advanced detection evasion techniques. The rise in evasive tactics,

React to this headline:

Loading spinner

Phishing campaigns thrive as evasive tactics outsmart conventional detection Read More »

7 access management challenges during M&A

7 access management challenges during M&A 23/05/2023 at 07:37 By Help Net Security Integrating an acquired company into a single organization is a daunting task that can take weeks, months, or even years to complete. To have a successful conclusion to the mergers and acquisitions (M&As) process, identity and access management (IAM) teams need time

React to this headline:

Loading spinner

7 access management challenges during M&A Read More »

Identity crimes: Too many victims, limited resources

Identity crimes: Too many victims, limited resources 18/05/2023 at 08:00 By Help Net Security The Identity Theft Resource Center (ITRC) has documented incidents of identity theft reported during 2022 and the first quarter of 2023, highlighting the use of strategies by criminals to convince people to willingly share protected information. The number of reported identity

React to this headline:

Loading spinner

Identity crimes: Too many victims, limited resources Read More »

Preparing for federal supply chain security standardization

Preparing for federal supply chain security standardization 17/05/2023 at 09:42 By Help Net Security In 2021, the Biden Administration published the Executive Order on Improving the Nation’s Cybersecurity (EO 14028), setting off an agency-wide security initiative with the ultimate objective of standardizing security requirements across the Department of Defense (DoD) and the Federal Civilian Executive

React to this headline:

Loading spinner

Preparing for federal supply chain security standardization Read More »

Is human threat hunting a fool’s errand?

Is human threat hunting a fool’s errand? 15/05/2023 at 12:11 By Help Net Security We all have witnessed automated advances creep into our modern threat hunting processes – and with good reason. As the rate of cyberattacks steadily increases, automated threat hunting processes are being integrated to help stem the tide by providing quicker security

React to this headline:

Loading spinner

Is human threat hunting a fool’s errand? Read More »

CISOs’ confidence in post-pandemic security landscape fades

CISOs’ confidence in post-pandemic security landscape fades 12/05/2023 at 06:00 By Help Net Security Most CISOs have returned to the elevated concerns they experienced early in the pandemic, according to Proofpoint. Elevated concerns among CISOs Globally, 68% of surveyed CISOs feel at risk of a material cyber attack, compared to 48% the year before, when

React to this headline:

Loading spinner

CISOs’ confidence in post-pandemic security landscape fades Read More »

Refined methodologies of ransomware attacks

Refined methodologies of ransomware attacks 11/05/2023 at 06:34 By Help Net Security Adversaries were able to encrypt data in 76% of the ransomware attacks that were conducted against surveyed organizations, according to Sophos. The survey also shows that when organizations paid a ransom to get their data decrypted, they ended up additionally doubling their recovery

React to this headline:

Loading spinner

Refined methodologies of ransomware attacks Read More »

The WhatsApp of secure computation

The WhatsApp of secure computation 08/05/2023 at 08:09 By Help Net Security A key term when discussing encryption these days is end-to-end (E2E) encryption. The idea with E2E encryption is that data is kept confidential between the encryptor and the intended receiver. This might seem an obvious requirement, but not all so-called secure systems offer

React to this headline:

Loading spinner

The WhatsApp of secure computation Read More »

Consumer skepticism is the biggest barrier to AI-driven personalization

Consumer skepticism is the biggest barrier to AI-driven personalization 08/05/2023 at 08:09 By Help Net Security Businesses worldwide are eagerly embracing the potential for AI to provide personalized customer experiences, but customers remain cynical, according to Twilio. This year’s report underscores the value of an AI-driven personalization strategy for brands looking to both retain existing

React to this headline:

Loading spinner

Consumer skepticism is the biggest barrier to AI-driven personalization Read More »

Scroll to Top