searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

cloud

Get our top stories in your inbox

Cloud computing top concerns: The focus is shifting

June 15, 2022

The Cloud Security Alliance (CSA) released the Top Threats to Cloud Computing: The Pandemic 11 report, which found a marked change in what cloud security provider (CSP) …

Only 13.5% of IT pros have mastered security in the cloud native space

June 9, 2022

Canonical released data from a survey revealing the goals, benefits, and challenges of cloud-native technologies. The report has surveyed more than 1,300 IT professionals over …

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring

June 3, 2022

Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted …

How to eliminate the weak link in public cloud-based multi-party computation

May 27, 2022

Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …

Discover your public cloud exposure with Recon.Cloud

May 3, 2022

In this video for Help Net Security, Gafnit Amiga, Director of Security Research at Lightspin, talks about the firm’s latest tool: Recon.Cloud. Recon.Cloud is a public …

Are businesses ready to implement cloud-native development?

April 28, 2022

OutSystems released findings from a global survey of IT leaders and developers gauging the benefits and challenges of cloud-native development, with results highlighting stark …

Shadow IT is a top concern related to SaaS adoption

April 26, 2022

Torii announced a report revealing that 69% of tech executives believe shadow IT is a top concern related to SaaS – or cloud application – adoption. The majority of …

Top attack techniques for breaching enterprise and cloud environments

April 14, 2022

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors to compromise critical assets in …

The two words you should never forget when you’re securing a cloud

April 14, 2022

When cloud providers sell their services, they know their customers are thinking about cybersecurity – that’s why providers tend to tout their impressive accreditations …

How many steps does it take for attackers to compromise critical assets?

April 7, 2022

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid …

Cloud identity access and management market to reach $13.6 billion by 2026

April 5, 2022

Amid the COVID-19 crisis, the global market for cloud identity access and management (IAM) estimated at $5.3 billion in the year 2022, is projected to reach a revised size of …

Cloud native application security is a critical priority, risk perception is worryingly low

April 1, 2022

Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their …

Posts navigation

1 2 3 4 5 … 30

Featured news

  • How parents can talk about online safety and personal info protection with their kids
  • Why digital trust needs to be a strategic imperative for your company
  • Exploring the insecurity of readily available Wi-Fi networks
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Photos: Cyber Week 2022

How parents can talk about online safety and personal info protection with their kids

Destructive firmware attacks pose a significant threat to businesses

Why digital trust needs to be a strategic imperative for your company

Don't miss

Photos: Cyber Week 2022

How parents can talk about online safety and personal info protection with their kids

Destructive firmware attacks pose a significant threat to businesses

Why digital trust needs to be a strategic imperative for your company

Researchers uncover ZuoRAT malware targeting home-office routers

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise