shadow IT

How exposure management elevates cyber resilience

How exposure management elevates cyber resilience 2024-04-09 at 07:46 By Help Net Security Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset identification and understand their assets’ security posture in relation to the whole estate. Instead of asking, “Are we exposed?” organizations …

How exposure management elevates cyber resilience Read More »

React to this headline:

Loading spinner

Shadow AI is the latest cybersecurity threat you need to prepare for

Shadow AI is the latest cybersecurity threat you need to prepare for 2024-03-22 at 08:01 By Help Net Security Shadow IT – the use of software, hardware, systems and services that haven’t been approved by an organization’s IT/IT Sec departments – has been a problem for the last couple of decades, and a difficult area …

Shadow AI is the latest cybersecurity threat you need to prepare for Read More »

React to this headline:

Loading spinner

How to turn shadow IT into a culture of grassroots innovation

How to turn shadow IT into a culture of grassroots innovation 2023-12-28 at 07:32 By Help Net Security The proliferation of generative AI tools has been compared to the dawn of the internet, the spread of smartphones and laptops, and the mass transition to cloud computing. All these advancements make it easier for individuals to …

How to turn shadow IT into a culture of grassroots innovation Read More »

React to this headline:

Loading spinner

How to withstand the onslaught of cybersecurity threats

How to withstand the onslaught of cybersecurity threats 10/11/2023 at 08:31 By Help Net Security “We brought a shovel to fight an avalanche.” That’s the sentiment shared by many business leaders, especially CISOs, CIOs and IT leaders as they face the current cybersecurity threat landscape. Like an avalanche, it’s constantly shifting and changing, moving quickly …

How to withstand the onslaught of cybersecurity threats Read More »

React to this headline:

Loading spinner

Anticipating the benefits of a passwordless tomorrow

Anticipating the benefits of a passwordless tomorrow 17/10/2023 at 06:02 By Help Net Security Businesses are actively moving to eradicate passwords from employees’ lives, with 89% of IT leaders expecting passwords to represent less than a quarter of their organization’s logins within five years or less, according to a FIDO Alliance and LastPass report. Moving …

Anticipating the benefits of a passwordless tomorrow Read More »

React to this headline:

Loading spinner

Unmasking the limitations of yearly penetration tests

Unmasking the limitations of yearly penetration tests 12/10/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous penetration testing because yearly ones are not enough. They leave blind spots and cannot match the security needs of regular releases and …

Unmasking the limitations of yearly penetration tests Read More »

React to this headline:

Loading spinner

Shadow IT: Security policies may be a problem

Shadow IT: Security policies may be a problem 20/09/2023 at 08:23 By Zeljka Zorz 3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they use …

Shadow IT: Security policies may be a problem Read More »

React to this headline:

Loading spinner

The blueprint for a highly effective EASM solution

The blueprint for a highly effective EASM solution 11/09/2023 at 08:04 By Mirko Zorz In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, and how it deals with uncovering hidden …

The blueprint for a highly effective EASM solution Read More »

React to this headline:

Loading spinner

Baseline standards for BYOD access requirements

Baseline standards for BYOD access requirements 07/09/2023 at 06:02 By Help Net Security 49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jamf survey. With the summer …

Baseline standards for BYOD access requirements Read More »

React to this headline:

Loading spinner

Network detection and response in the modern era

Network detection and response in the modern era 21/08/2023 at 07:04 By Mirko Zorz In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learning algorithms to …

Network detection and response in the modern era Read More »

React to this headline:

Loading spinner

53% of SaaS licenses remain unused

53% of SaaS licenses remain unused 04/07/2023 at 06:38 By Help Net Security Enterprise leaders in procurement, IT, and finance need to take immediate action to rationalize their SaaS portfolios to prevent spending and governance challenges from spiraling out of control, according to Productiv. Productiv analyzed how nearly 100 million SaaS licenses were used over …

53% of SaaS licenses remain unused Read More »

React to this headline:

Loading spinner
Scroll to Top