![RSAC2023 pt2](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/26160826/img_6432-1200px-400x200.jpg)
Photos: RSA Conference 2023, part 2
RSA Conference 2023 is taking place at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Part 1 of the photos is …
![RSAC2023 entrance](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/26145101/img_6360-1200px-400x200.jpg)
Photos: RSA Conference 2023
RSA Conference 2023 is taking place at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093728/phishing1-400x200.jpg)
AI tools help attackers develop sophisticated phishing campaigns
Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block, according to Zscaler report. …
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
LogRhythm and Zscaler integration streamlines website access control
LogRhythm and Zscaler work together to help organizations around the globe increase network insight and address a variety of cloud access security challenges faced by the …
![3CX](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/03150300/3cx-1600-400x200.jpg)
3CX supply chain attack: What do we know?
Five days have passed since the supply chain attack targeting 3CX customers gained wider public attention, but the software’s manufacturer is yet to confirm how the …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/09173929/network-blue-400x200.jpg)
Known unknowns: Refining your approach to uncategorized web traffic
Cybersecurity is such a complex field that even the best-trained, best-equipped, and most experienced security managers will sometimes struggle to decide which of several …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105149/idea-400x200.jpg)
Enhance security while lowering IT overhead in times of recession
“Is cybersecurity recession-proof?” That’s the question on the minds of many security professionals and executives as a possible economic downturn of indeterminate length and …
![Acquisitions](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111326/acquisitions_1200-400x200.jpg)
Zscaler acquires Canonic Security to accelerate how enterprises address SaaS-native threats
Zscaler acquires Canonic Security to prevent organizations’ growing risks of SaaS supply chain attacks. With the massive migration to the cloud, as organizations are …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
Zscaler Resilience prepares businesses for unpredictable events
Zscaler has unveiled Zscaler Resilience, incorporating a new set of capabilities that extend the resilience of Zscaler’s architecture and operations and maintain …
![search](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092818/search-400x200.jpg)
Getting data loss prevention right
When a CISO takes the wrong approach to data loss prevention (DLP), it can quickly compound into a triple loss. First, they lose their organization’s money by investing in an …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
85% of attacks now use encrypted channels
Malware continues to pose the greatest threat to individuals and businesses across nine key industries, with manufacturing, education and healthcare being the most commonly …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Leveraging the full potential of zero trust
More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege