Help Net Security
Investigations are an unfortunate fact of life for most corporations
Corporate investigations, which can be triggered by any number of events, have become a fact of life for most companies, according to a survey from H5. The survey focused on …
Most decision makers expect AI and 5G to impact their cybersecurity strategy
An overwhelming majority of cybersecurity and risk management leaders believe that developments in 5G wireless technology will create cybersecurity challenges for their …
DevOps firewall: How pre-configuring your cloud deployment can ensure compliance
Following the recent massive Capital One data breach, it’s clear that even some of the world’s largest and most respected companies working in the cloud are still vulnerable …
New protocol extends Wi-Fi range, can be used with existing hardware
A protocol that significantly extends the distance a Wi-Fi-enabled device can send and receive signals has been created by a group of researchers led by a Brigham Young …
IaaS cloud vulnerabilities expected to increase 50% over 2018 figures
Although the total number of IaaS cloud vulnerabilities is still small and the technology relatively young, volumes are increasing year-over-year at a steady rate, an expected …
Integrating security into IoT projects is not easy, but it’s increasingly urgent
With an installed base of 44 billion connected devices projected for 2023, the amount of data and information generated and shared will reach zettabytes of data, according to …
Despite enthusiasm for AI adoption, governments are experiencing challenges
Public-service executives in Europe are optimistic and enthusiastic about the impact of artificial intelligence (AI) on government operations and services but face challenges …
Whitepaper: Building a Threat Intelligence Programme
ThreatConnect surveyed more than 350 UK information security decision makers. Building a Threat Intelligence Programme discusses research findings on best practices and impact …
Week in review: Avast breach, deepfakes, VisibleV8 monitors JavaScript in the wild
Here’s an overview of some of last week’s most interesting news and articles: Phishing attacks are a complex problem that requires layered solutions Most cyber …
Security pros like their job, yet many struggle with burnout and work-life balance
There is a persistent gap among cybersecurity professionals regarding gender and diversity, but also challenges with work-life balance. Lack of diversity Among the security …
Blacklisted apps increase 20%, attackers focus on tax-branded key terms
In 2018, global app spending hit $101 billion and is expected to surpass that this year. Mobile is a significant portion of the overall corporate attack surface where security …
CIO role remains critical in leading enterprises through crises and transformations
The march to digitalization is so commonplace today that 40% of global CIOs have reached scale for their digital endeavors, more than doubling the proportion of enterprises …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)