security practices

The proliferation of non-human identities

The proliferation of non-human identities 2024-09-18 at 07:01 By Mirko Zorz 97% of non-human identities (NHIs) have excessive privileges, increasing unauthorized access and broadening the attack surface, according to Entro Security’s 2025 State of Non-Human Identities and Secrets in Cybersecurity report. 92% of organizations expose NHIs to third parties, resulting in unauthorized access if third-party […]

React to this headline:

Loading spinner

The proliferation of non-human identities Read More »

How to improve response to emerging cybersecurity threats

How to improve response to emerging cybersecurity threats 2024-04-22 at 06:02 By Help Net Security Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos featuring security experts discussing various

React to this headline:

Loading spinner

How to improve response to emerging cybersecurity threats Read More »

Securing data at the intersection of the CISO and CDO

Securing data at the intersection of the CISO and CDO 06/11/2023 at 08:34 By Help Net Security Two groups in particular play a key and critical role in ensuring data governance and security: the CISO and the CDO. CISOs are responsible for identifying and managing risks associated with data security, while CDOs are responsible for

React to this headline:

Loading spinner

Securing data at the intersection of the CISO and CDO Read More »

Scroll to Top