searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

enterprise

Get our top stories in your inbox

SAP applications are getting compromised by skilled attackers

April 7, 2021

Newly provisioned, unprotected SAP applications in cloud environments are getting discovered and compromised in mere hours, Onapsis researchers have found, and vulnerabilities …

Zero Trust creator talks about implementation, misconceptions, strategy

April 6, 2021

A little over a decade ago, John Kindervag outlined the Zero Trust security model. As a VP and Principal Analyst on the Security and Risk Team at Forrester Research, he spent …

Microsoft offers rewards for security bugs in Microsoft Teams

March 25, 2021

Microsoft is starting a new Applications Bounty Program, and the first application that they want researchers to find bugs in is Microsoft Teams, its popular business …

Phishers’ perfect targets: Employees getting back to the office

March 22, 2021

Phishers have been exploiting people’s fear and curiosity regarding breakthroughs and general news related to the COVID-19 pandemic from the very start, and will …

Ongoing Office 365-themed phishing campaign targets executives, assistants, financial departments

March 18, 2021

A sophisticated and highly targeted Microsoft Office 365 phishing campaign is being aimed at C-suite executives, executive assistants and financial departments across numerous …

With data volumes and velocity multiplying, how do you choose the right data security solution?

March 18, 2021

There is no doubt that the COVID-19 pandemic has caused radical changes in our personal and working lives. The sudden and massive surge of employees working from home and the …

Why is financial cyber risk quantification important?

March 17, 2021

Cyber incidents are a major risk facing organizations and companies of all sizes and industries. These risks have only increased in the past year, with much of the workforce …

Microsoft releases one-click Exchange On-Premises Mitigation Tool

March 16, 2021

Microsoft has released Exchange On-Premises Mitigation Tool (EOMT), which quickly performs the initial steps for mitigating the ProxyLogon flaw (CVE-2021-26855) on any …

As attacks on Exchange servers escalate, Microsoft investigates potential PoC exploit leak

March 15, 2021

Microsoft Exchange servers around the world are still getting compromised via the ProxyLogon (CVE-2021-26855) and three other vulnerabilities patched by Microsoft in early …

Two new ways backup can protect enterprise SaaS data

March 12, 2021

Software-as-a-Service (SaaS) apps are a treasure trove of information. They’re where business takes place and decisions get made, so it’s not surprising that they’re …

Getting your application security program off the ground

March 11, 2021

IT and security professionals are increasingly concerned about attackers compromising their mission-critical applications. According to a recent Ponemon study, the reasons for …

The impact of the pandemic on digital transformation and data access

March 11, 2021

Data access has become more critical for 53% of survey respondents throughout the pandemic as analytics workloads and demands increase significantly, according to a survey …

Posts navigation

1 2 3 4 5 … 25
lock

How micro-segmentation creates an uphill battle for intruders

  • Securing vehicles from potential cybersecurity threats
  • Approaching zero trust security strategically
CISO’s guide to automating third-party cyber risk management

What's new

encryption

Remote work increasing the growth rate of the EDR market

Pulse Secure

Critical infrastructure implications of the Pulse Secure multi-factor authentication bypass

Monero

Monero-mining botnet targets orgs through recent MS Exchange vulnerabilities

Infosecurity transformation and building proactive mitigation strategies

Don't miss

Pulse Secure

Critical infrastructure implications of the Pulse Secure multi-factor authentication bypass

Monero

Monero-mining botnet targets orgs through recent MS Exchange vulnerabilities

Cloud

Cloud Sniper: Manage and automate cloud security operations

lock

How micro-segmentation creates an uphill battle for intruders

SonicWall

Hackers found leveraging three SonicWall zero-day vulnerabilities

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Cloud Sniper: Manage and automate cloud security operations
  • How do I select an identity management solution for my business?
  • Securing vehicles from potential cybersecurity threats
  • Securing an online marketplace through the COVID-19-fueled boom

(IN)SECURE Magazine ISSUE 68 (March 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise