Please turn on your JavaScript for this page to function normally.
laptop
Employees are worried about cyber threats in their home office environments

IBM Security released findings from a study focused on the behaviors and security risks of those new to working from home (WFH) during the COVID-19 pandemic. Cyber threats in …

shield
How to secure software in a DevOps world

The COVID-19 pandemic and its impact on the world has made a growing number of people realize how many of our everyday activities depend on software. We increasingly work, …

Qualys
Keep remote workers and their devices secure with one click

In this interview for Help Net Security, Shailesh Athalye, VP Compliance at Qualys, discusses cloud-based Remote Endpoint Protection and illustrates how security teams can …

healthcare
Privacy and security concerns related to patient data in the cloud

The Cloud Security Alliance has released a report examining privacy and security of patient data in the cloud. In the wake of COVID-19, health delivery organizations (HDOs) …

face
Does a generalization of tracking data cover up our traces on the internet?

Tracking of our browsing behavior is part of the daily routine of internet use. Companies use it to adapt ads to the personal needs of potential clients or to measure their …

privacy
Companies are rethinking their approach to privacy management

TrustArc announced the results of its survey on how organizations are protecting and leveraging data, their most valuable asset. The survey polled more than 1,500 respondents …

DDoS
How the pandemic affected DDoS attack patterns, global internet traffic

There has been a shift in internet traffic patterns coinciding with an increase in DDoS and other types of network attacks in recent months as organizations across industries …

find
The smaller the business, the smaller the focus on cybersecurity

With 89% of small businesses moving to a remote workforce, there remains a significant gap between the perceived importance of cybersecurity protections for businesses with …

cybercrime
How much is your data worth on the dark web?

Credit card details, online banking logins, and social media credentials are available on the dark web at worryingly low prices, according to Privacy Affairs. Online banking …

PI System
Vulnerable platform used in power plants enables attackers to run malicious code on user browsers

Otorio’s incident response team identified a high-score vulnerability in OSISoft’s PI System. They immediately notified OSIsoft Software of the vulnerability, which …

lock
Building relationships: The key to becoming a true cybersecurity leader

Slowly but surely, organizations are starting to view information security as a business problem, not an IT problem, and as everybody’s responsibility. “The CISO …

security awareness
How do I select a security awareness solution for my business?

“Great security awareness training, that is part of a healthy cyber security culture and that is aimed at encouraging positive security behaviours, is essential. The …

Don't miss

Cybersecurity news