Please turn on your JavaScript for this page to function normally.
cloud
Security and privacy still the top inhibitors of cloud adoption

Cloud adoption is gaining momentum, as 36 percent of organizations are currently in the process of migrating to the cloud while close to 20 percent consider themselves to be …

email
Automatically and invisibly encrypt email as soon as it is received on any trusted device

While an empty email inbox is something many people strive for, most of us are not successful. And that means that we probably have stored away hundreds, even thousands, of …

employee
Week in review: Employee cybersecurity essentials, ASUS attack, lessons learned from crypto hacks

Here’s an overview of some of last week’s most interesting news and articles: Attackers compromised ASUS to deliver backdoored software updates Unknown attackers have …

network
Serverless, shadow APIs and Denial of Wallet attacks

In this Help Net Security podcast, Doug Dooley, Chief Operating Officer at Data Theorem, discusses serverless computing, a new area that both DevOps leaders and enterprise …

CyberArk report
Enterprises fear disruption to business critical applications, yet don’t prioritize securing them

The majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on – such as ERP and CRM systems – any …

jackal
Lessons learned from the many crypto hacks

The one poignant lesson that crypto investors globally have learned over the years is that despite the immutable, impenetrable nature of the technology behind cryptocurrencies …

Power
CIOs admit certificate-related outages routinely impact critical business applications and services

Certificate-related outages harm the reliability and availability of vital network systems and services while also being extremely difficult to diagnose and remediate. …

Capgemini research
Status of AI implementation at automotive organizations

Just 10 percent of major automotive companies are implementing artificial intelligence (AI) projects at scale, with many falling short of an opportunity that could increase …

Netsparker
Identify web application vulnerabilities and prioritize fixes with Netsparker

In this Help Net Security podcast, Ferruh Mavituna, CEO at Netsparker, talks about web application security and how Netsparker is helping businesses of any size keep their web …

IoT
Security remains a top concern for IoT executives, but small fixes can shore up ecosystem resilience

66 percent of companies say their c-suite executives are supportive of their IoT implementation, but even with strong support they noted there are hurdles to overcome. A …

chip
Algorithms can now find bugs in computer chips before they are made

In early 2018, cybersecurity researchers discovered two security flaws they said were present in almost every high-end processor made and used by major companies. UPEC product …

risk
Third-party cyber risk management is a burden on human and financial resources

Organizations and third parties see their third-party cyber risk management (TPCRM) practices as important but ineffective. There are four major takeaways for key decision …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools