Please turn on your JavaScript for this page to function normally.
DNS
Malicious DNS traffic targets corporate and personal devices

Akamai’s security research team examined potentially compromised devices, discovering that 12.3% communicated with domains associated with malware or ransomware during Q2 …

Kubernetes
Best practices for Kubernetes security in the enterprise market

As part of digital transformation, more and more organizations are transforming their application using cloud native architecture to become more agile and accelerate time to …

DevSecOps
Development of secure software now an imperative for global DevOps teams

GitLab released the results of its annual DevSecOps survey which highlights the continued prioritization of security and compliance, investment in toolchain consolidation, and …

organize
7 metrics to measure the effectiveness of your security operations

Given inflation and economic uncertainty, the cybersecurity industry is starting to experience budget cuts, despite a surge in ransomware attacks. As more budgets are going …

Companies struggle to govern their new cloud environments

Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …

ransomware payments
Should ransomware payments be banned? A few considerations

Several U.S. states have recently moved to ban local and state agencies and organizations funded by taxpayers’ dollars from paying off ransomware gangs, and a few more …

DDoS
DDoS activity launched by patriotic hacktivists is on the rise

Radware released a report revealing that the number of malicious DDoS attacks climbed by 203% compared to the first six months of 2021. This Help Net Security video provides …

BEC scams
How BEC attacks on human capital management systems are increasing

In this Help Net Security video, Jon Hencinski, VP of Security Operations at Expel, talks about how their SOC team has recently observed Business Email Compromise (BEC) …

airplane
The complexity of modern aircraft cybersecurity

Modern aircraft are more connected now than they ever have been. The results have been rewards like faster flight turnarounds, greater fuel efficiency, and more comfortable …

People
Creating cyber career opportunities during the talent shortage

With roughly 700,000 cybersecurity positions open, businesses across America are feeling the direct impact of the cyber talent shortage. As ransomware attacks and data …

Gambling
Gambling sites are losing significant amounts of revenue due to raising DDoS attacks

Imperva releases data showing that 25% of all gambling sites were hit with DDoS attacks executed by botnets in June. This Help Net Security video uncovers how DDoS attacks on …

cloud
How complicated access management protocols have impacted cloud security

During AWS re:Inforce, Amazon executives emphasized how important access control is when it comes to cloud security and why IT leaders need to ask who has access to what and …

Don't miss

Cybersecurity news