Please turn on your JavaScript for this page to function normally.
Log4j
Security leaders want legal action for failing to patch for Log4j

The recently identified vulnerability in the Log4j Java logging package has created headaches for security professionals around the world. 61% of organizations responding to …

mobile apps
How much do different generations trust their mobile devices’ security?

McAfee unveiled two survey reports which reveal the level of disconnect that exists between generations over how safe mobile devices are and how vulnerable consumers are to …

Critical infrastructure
Lack of visibility plaguing ICS environments

Dragos released its report on cyber threats facing industrial organizations, naming the emergence of three new threat groups targeting ICS/OT environments, including two that …

Rowland Corr
Leveraging mobile networks to threaten national security

In this interview with Help Net Security, Rowland Corr, Director of National Security Intelligence at AdaptiveMobile Security, explains how mobile networks can be leveraged as …

danger
Cybercrime getting more destructive, remote workers in the crosshairs

Fortinet’s threat intelligence from the second half of 2021 reveals an increase in the automation and speed of attacks demonstrating more advanced persistent cybercrime …

endpoint protection
Devastating breaches apparently still not enough for organizations to prioritize endpoint security

Action1 released a report based on feedback from 491 IT professionals worldwide. The study explores the extent to which organizations plan to prioritize endpoint security and …

healthcare
Help Net Security: Healthcare Cybersecurity Report has been released

Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …

Scott Best
How much can you trust your printer?

In this interview with Help Net Security, Scott Best, Director of anti-tamper security technology at Rambus, talks about what organizations should be aware of when it comes to …

data
To shift to data-driven security decision making: Start with the right data

We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …

Door
83% of employees continue accessing old employer’s accounts

In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to …

dislike
Social media attacks surged in 2021, financial institutions targeted the most

Social media as a threat channel saw a two-fold increase in attacks throughout 2021, according to a report from PhishLabs. In Q4 and throughout 2021, PhishLabs analysed …

ENISA
ENISA and CERT-EU publish set of cybersecurity best practices for public and private organizations

The European Union Agency for Cybersecurity (ENISA) and CERT-EU published a joint set of cybersecurity best practices for public and private organizations in the EU. ENISA …

Don't miss

Cybersecurity news