Please turn on your JavaScript for this page to function normally.
identity
Beating biometrics: Why biometric authentication alone is not a panacea

As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it …

syringe
Researchers develop a technique to vaccinate algorithms against adversarial attacks

A set of techniques to effectively vaccinate algorithms against adversarial attacks have been developed by researchers from CSIRO’s Data61. Algorithms …

SD-WAN
Which SD-WAN products offer a notable return on investment?

Eight of the industry’s leading SD-WAN products were examined by NSS Labs to help enterprises understand the merits of products in the market and identify the capabilities …

find
Why poor visibility is hampering cybersecurity

Enterprises are challenged with security basics, according to Panaseer’s first Security Leader’s Peer Report. Data from an external survey of 200 enterprise …

wireless
Countering industrial cyberthreats with secure, standards-based, licensed wireless networks

Over the past few years, cyber threats aimed at a number of critical infrastructure targets have drawn our attention to the security of mission critical networks. These …

money
Insured losses from a cyber catastrophe could reach billions

Analysis shows insured business interruption losses from a cyber catastrophe could reach an estimated $3.25 billion. Kovrr, a predictive cyber risk modeling company, released …

cube
IoT explodes worldwide, researchers investigate security issues present in the devices real users own

About 40 percent of households across the globe now contain at least one IoT device, according to Avast. In North America, that number is almost double, at 66 percent, …

Qualys
How to add security to digital transformation processes

In this Help Net Security podcast, Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about adding security to digital transformation processes. …

Botnets shift from Windows towards Linux and IoT platforms

Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …

Tesla
Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks

Tesla Model S and Model 3 electric cars are vulnerable to cyberattacks aimed at their navigation systems, according to research from Regulus Cyber. Staged attack caused the …

CEO
Executives now recognize cybersecurity as a key business driver

Cybersecurity is now recognized as a key business driver by the C-Suite, according to a new Radware report. Executives that participated in the survey found that the four main …

mobile device
Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps

Recently messaging applications got hit hard with vulnerabilities, hacking attempt disclosures by nation-states and insider employee inappropriate behaviors. As organizations …

Don't miss

Cybersecurity news