remote working

15% of office workers use unsanctioned GenAI tools

15% of office workers use unsanctioned GenAI tools 2024-10-03 at 06:31 By Help Net Security Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. Understanding workplace behavior key to strengthening security In fact, one in two […]

React to this headline:

Loading spinner

15% of office workers use unsanctioned GenAI tools Read More »

Strategies for transitioning to a SASE architecture

Strategies for transitioning to a SASE architecture 2024-05-23 at 07:33 By Mirko Zorz In this Help Net Security, Prakash Mana, CEO at Cloudbrink, discusses the primary challenges companies face when transitioning to a SASE architecture and how to overcome them. What are companies’ primary challenges when transitioning to a SASE architecture, and how can they

React to this headline:

Loading spinner

Strategies for transitioning to a SASE architecture Read More »

Strategies for combating AI-enhanced BEC attacks

Strategies for combating AI-enhanced BEC attacks 2024-05-21 at 07:31 By Mirko Zorz In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is AI being leveraged by cybercriminals to enhance the effectiveness of BEC scams? BEC attacks are

React to this headline:

Loading spinner

Strategies for combating AI-enhanced BEC attacks Read More »

The next wave of mobile threats

The next wave of mobile threats 2024-04-12 at 07:01 By Help Net Security According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security software market to grow by $2.75 billion between 2020 and 2025, expanding at a CAGR of 9.68%. In

React to this headline:

Loading spinner

The next wave of mobile threats Read More »

How to incorporate human-centric security

How to incorporate human-centric security 2023-12-27 at 07:32 By Help Net Security Cybersecurity is awash in threat detection and mitigation solutions: SIEM, DLP, SOAR, MDR, EDR, XDR, and more. Threat detection is essential, as it serves to locate and minimize the threat as quickly and effectively as possible. However, some companies are starting to embrace

React to this headline:

Loading spinner

How to incorporate human-centric security Read More »

Consumers plan to be more consistent with their security in 2024

Consumers plan to be more consistent with their security in 2024 23/11/2023 at 07:31 By Help Net Security The vast majority of consumers are concerned that cyberattacks will increase or remain consistent over the coming year (97%) and become more sophisticated (69%), outpacing the ability of cyber defenses to protect against these threats, according to

React to this headline:

Loading spinner

Consumers plan to be more consistent with their security in 2024 Read More »

IT workers see generative AI as a serious threat to their profession

IT workers see generative AI as a serious threat to their profession 26/09/2023 at 06:01 By Help Net Security While many IT workers see the productivity benefits of AI, 56% believe it benefits employers more than employees, according to Ivanti. Additionally, 63% are concerned generative AI tools might take their job in the next five

React to this headline:

Loading spinner

IT workers see generative AI as a serious threat to their profession Read More »

Cybersecurity risks dampen corporate enthusiasm for tech investments

Cybersecurity risks dampen corporate enthusiasm for tech investments 15/09/2023 at 07:02 By Help Net Security 64% of IT leaders believe that cybersecurity concerns are negatively impacting their organization’s willingness to invest in innovative tech, according to a report by HPE Aruba Networking. This is perhaps unsurprising as 91% either consider emerging tech a danger or

React to this headline:

Loading spinner

Cybersecurity risks dampen corporate enthusiasm for tech investments Read More »

Heavy workloads driving IT professionals to resign

Heavy workloads driving IT professionals to resign 17/08/2023 at 06:32 By Help Net Security A quarter of IT professionals are seriously contemplating leaving their current jobs within the next six months, potentially costing US companies upwards of 145 billion dollars, according to Ivanti. These statistics highlight the pressing need for organizations to relieve the burden

React to this headline:

Loading spinner

Heavy workloads driving IT professionals to resign Read More »

Balancing telecom security, law enforcement, and customer trust

Balancing telecom security, law enforcement, and customer trust 15/08/2023 at 07:48 By Mirko Zorz In this Help Net Security interview, Mark O’Neill, CTO at BlackDice Cyber, talks about collaboration, transparent policies, and a security-first mindset. As 5G and IoT emerge, robust measures and AI will navigate challenges and shape the telecom industry’s future. Considering the

React to this headline:

Loading spinner

Balancing telecom security, law enforcement, and customer trust Read More »

Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future

Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future 07/08/2023 at 07:32 By Mirko Zorz In this exclusive Help Net Security interview, we delve into the world of cybersecurity with Michael Adams, the CISO at Zoom. Adams analyzes how organizations grapple with the effects of workforce shortages and remote work complications, offering insights

React to this headline:

Loading spinner

Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future Read More »

CISOs under pressure: Protecting sensitive information in the age of high employee turnover

CISOs under pressure: Protecting sensitive information in the age of high employee turnover 17/07/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust principles, identity access management, and managed security services are crucial for

React to this headline:

Loading spinner

CISOs under pressure: Protecting sensitive information in the age of high employee turnover Read More »

Employees worry less about cybersecurity best practices in the summer

Employees worry less about cybersecurity best practices in the summer 30/06/2023 at 04:17 By Help Net Security IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, according to ThreatX. With more endpoints and applications in use, and often

React to this headline:

Loading spinner

Employees worry less about cybersecurity best practices in the summer Read More »

Organizations actively embrace zero trust, integration remains a hurdle

Organizations actively embrace zero trust, integration remains a hurdle 21/06/2023 at 06:09 By Help Net Security IT teams have made security efforts and progress in zero-trust implementation strategies to establish a new sense of normalcy following the network upheaval caused by the start of the global pandemic. They have also addressed the need to secure

React to this headline:

Loading spinner

Organizations actively embrace zero trust, integration remains a hurdle Read More »

Demand for STEM training skyrockets

Demand for STEM training skyrockets 20/06/2023 at 06:02 By Help Net Security The rapid pace of globalization, digital transformation, and AI advancements have created a renewed demand for digital and human skills among US learners, according to Coursera. “The rise of digital jobs and remote work is creating unprecedented opportunities for local talent to participate

React to this headline:

Loading spinner

Demand for STEM training skyrockets Read More »

Navigating cybersecurity in the age of remote work

Navigating cybersecurity in the age of remote work 01/06/2023 at 07:34 By Mirko Zorz In this Help Net Security interview, Jay Chaudhry, CEO at Zscaler, talks about connecting and securing remote employees and their devices to access organizational resources from any location. He discusses the potential risks of remote VPN access, the increasing reliance on

React to this headline:

Loading spinner

Navigating cybersecurity in the age of remote work Read More »

Digital nomads drive changes in identity verification

Digital nomads drive changes in identity verification 29/05/2023 at 06:34 By Help Net Security Over the past year, 4 in 5 financial companies had experienced an increase in the number of verification cases involving foreign documents, according to Regula. The post Digital nomads drive changes in identity verification appeared first on Help Net Security. This

React to this headline:

Loading spinner

Digital nomads drive changes in identity verification Read More »

The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals

The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals 25/05/2023 at 08:12 By Help Net Security The widespread adoption of remote and hybrid working practices in recent years has brought numerous benefits to various industries, but has also introduced new cyber threats, particularly in the critical infrastructure sector. These threats

React to this headline:

Loading spinner

The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals Read More »

Blacklist untrustworthy apps that peek behind your firewall

Blacklist untrustworthy apps that peek behind your firewall 22/05/2023 at 08:05 By Help Net Security With an increasing number of endpoints and expanding attack surfaces, dodgy apps can offer a way around your firewall. Due to data privacy concerns, Montana has passed the first bill in the United States to ban TikTok. Previously, India has

React to this headline:

Loading spinner

Blacklist untrustworthy apps that peek behind your firewall Read More »

Scroll to Top