Help Net Security
NIST crowdsourcing challenge aims to de-identify public data sets to protect individual privacy
NIST has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect individual privacy. The …
Finish the year strong with special pricing on CISSP training thru Oct. 30
Go for CISSP certification now to achieve more in 2021 as a globally recognized cybersecurity leader. Whether you’re motivated by career advancement, higher pay or inspiring a …
Week in review: Hardware security, protecting APIs, determining the true impact of a cyber attack
Here’s an overview of some of last week’s most interesting news, reviews and articles: The biggest cyber threats organizations deal with today Microsoft has …
Inadequate skills and employee burnout are the biggest barriers to digital transformation
Nearly six in ten organizations have accelerated their digital transformation due to the COVID-19 pandemic, an IBM study of global C-suite executives revealed. Top priorities …
Is passwordless authentication actually the future?
While passwords may not be going away completely, 92 percent of respondents believe passwordless authentication is the future of their organization, according to a LastPass …
Average data queries take too long, yet organizations need daily data insights to make decisions
58% of organizations make decisions based on outdated data, according to an Exasol research. The report reveals that 84% of organizations are under increasing pressure to make …
HP expands its Bug Bounty Program to focus on office-class print cartridge security vulnerabilities
HP has expanded its Bug Bounty Program to focus specifically on office-class print cartridge security vulnerabilities. The program underscores HP’s commitment to delivering …
Three immediate steps to take to protect your APIs from security risks
In one form or another, APIs have been around for years, bringing the benefits of ease of use, efficiency and flexibility to the developer community. The advantage of using …
Employees increasingly masking online activities
This year’s shift to a near 100% WFH workforce by the Global 5000 has significantly changed the behaviors of trusted insiders, a DTEX Systems report reveals. Key findings …
Challenges and drivers influencing container infrastructure backup and recovery
As containers continue to rise in popularity, organizations need to understand that they are uniquely designed and consequently require a specialized data protection strategy. …
Few security pros believe their organizations have reached full DevSecOps maturity
20% of security professionals described their organizations’ DevSecOps practices as “mature”, while 62% said they are improving practices and 18% as “immature”, a WhiteSource …
70% of consumers would cut ties with doctors over unprotected health data
There are growing privacy concerns among Americans due to COVID-19 with nearly 70 percent citing they would likely sever healthcare provider ties if they found that their …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform