• (IN)SECURE Magazine
  • About us
  • Contact

  • Start
  • News
  • Articles
  • Malware
  • Reviews
  • Events
  • Whitepapers
  • Newsletters
  • Start
  • News
  • Articles
  • Malware
  • Reviews
  • Events
  • Whitepapers
  • Newsletters
Don't miss:
Energy security pros worry about catastrophic failure due to cyberattacks
When BEC scammers specialize
NIST releases Cybersecurity Framework 1.1
Get our Top Stories to your inbox
 

Featured news

  • Energy security pros worry about catastrophic failure due to cyberattacks
  • When BEC scammers specialize
  • NIST releases Cybersecurity Framework 1.1
  • Cisco plugs critical hole in WebEx, users urged to upgrade ASAP
  • LocalBlox found leaking info on tens of millions of individuals
  • Open-source library for improving security of AI systems
  • Researchers propose scheme to secure brain implants
  • New targeted surveillance spyware found on Google Play
  • Cryptominers displace ransomware as the number one threat
  • Top tech firms pledge not to help governments launch cyberattacks
  • Researchers develop algorithm to detect fake users on social networks
  • Tech-skilled cybersecurity pros in high demand and short supply

cloud security

Get our Top Stories to your inbox
Qualys

Free Qualys services give orgs visibility of their digital certs and cloud assets

  • April 16, 2018
  • cloud security
  • Qualys
  • RSA Conference 2018

Qualys announced two new free groundbreaking services: CertView and CloudView. Harnessing the power and scalability of the Qualys Cloud Platform, Qualys CertView and CloudView …

cloud

1-in-4 orgs using public cloud has had data stolen

  • April 16, 2018
  • cloud adoption
  • cloud security
  • enterprise

McAfee has polled 1,400 IT professionals across a broad set of countries (and continents), industries, and organization sizes and has concluded that lack of adequate …

cloud

Organizations want to leverage the cloud but are held back by security misconceptions

  • April 11, 2018
  • cloud adoption
  • cloud computing
  • cloud security

iboss has published the findings of its 2018 Enterprise Cloud Trends report. The survey of IT decision makers and office workers in U.S. enterprises found that 64% of IT …

ShiftLeft

ShiftLeft: Fully automated runtime security solution for cloud applications

  • April 5, 2018
  • cloud security
  • cybersecurity
  • DevOps

When talking about data loss prevention, the first thing that comes to mind are solutions aimed at stopping users from moving sensitive documents/data out of a network. But …

cloud

Experiences and attitudes towards cloud-specific security capabilities

  • March 26, 2018
  • automation
  • Barracuda Networks
  • cloud security

Dimensional research conducted a survey of IT professionals responsible for cloud environments. The survey, which is comprised of data collected from over 600 respondents from …

cloud

Cloud access management is integral to adopting cloud applications

  • March 8, 2018
  • authentication
  • CISO
  • cloud security

The proliferation of cloud applications and use of a disparate range of devices within businesses has led to 64% of IT leaders admitting that their security teams are …

cloud

The driving force of cloud security investments

  • March 8, 2018
  • cloud security
  • cybersecurity
  • Netwrix

A new Netwrix report supplements the 2018 Netwrix Cloud Security Report, unveiling survey findings specific to various industries and regions. Overall, 853 organizations …

AWS

To prevent data breaches, AWS offers S3 bucket permissions check to all users

  • February 21, 2018
  • AWS
  • cloud security
  • cloud storage

Amazon Web Services (AWS) has announced that all customers can now freely check whether their S3 buckets are leaking stored data. “Previously available only to Business …

cloud complexity

Even with cloud providers implementing defenses, glaring weaknesses remain

  • February 21, 2018
  • cloud security
  • CXO
  • cybersecurity

A new report from RedLock offers a look at the threats and vulnerabilities that continue to mount in public cloud computing environments. Account compromises keep rising Poor …

cloud complexity

Innovative organizations build security into their cloud strategy

  • February 1, 2018
  • cloud adoption
  • cloud security
  • cybersecurity

Businesses are increasingly evolving their security strategy to advance their cloud strategy. Based on research and interviews with industry practitioners, Hurwitz & …

Posts navigation

1 2 3 4 5 6 … 83 Next
brain

Researchers propose scheme to secure brain implants

  • Researchers develop algorithm to detect fake users on social networks
  • US, UK warn Russians hackers are compromising networking devices worldwide
  • Your Android phone says it’s fully patched, but is it really?
  • 1-in-4 orgs using public cloud has had data stolen
Spot
light
Information security can enable business as soon as we change the conversation

What's New

Industry

Energy security pros worry about catastrophic failure due to cyberattacks

maritime shipping

When BEC scammers specialize

Cisco WebEx

Cisco plugs critical hole in WebEx, users urged to upgrade ASAP

fight

Organizations are becoming more resilient to focused cyber attacks

critical infrastructure

NIST releases Cybersecurity Framework 1.1

Don't miss

Industry

Energy security pros worry about catastrophic failure due to cyberattacks

maritime shipping

When BEC scammers specialize

critical infrastructure

NIST releases Cybersecurity Framework 1.1

Cisco WebEx

Cisco plugs critical hole in WebEx, users urged to upgrade ASAP

Facepalm

LocalBlox found leaking info on tens of millions of individuals

brain

Researchers propose scheme to secure brain implants

eye

New targeted surveillance spyware found on Google Play

crypto currency

Cryptominers displace ransomware as the number one threat

hands

Top tech firms pledge not to help governments launch cyberattacks

mask

Researchers develop algorithm to detect fake users on social networks

work

Tech-skilled cybersecurity pros in high demand and short supply

storm

US, UK warn Russians hackers are compromising networking devices worldwide

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2018 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • Start
  • News
  • Articles
  • Malware
  • Reviews
  • Events
  • Whitepapers
  • Newsletters

Copyright 1998-2018 by Help Net Security | Read our privacy policy | About us | Advertise

Design by FatDUX