searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

News

Get our top stories in your inbox
week in review

Week in review: Pen testing, Sunspot malware, Microsoft plugs Defender zero-day

January 17, 2021

Here’s an overview of some of last week’s most interesting news and articles: Top videoconferencing attacks and security best practices Videoconferencing has …

bot

What analytics can unveil about bot mitigation tactics

January 15, 2021

25% of internet traffic on any given day is made up of bots, the Kasada Research Team has found. In fact, there is a synthetic counterpart for almost every human interaction …

gap

Understanding third-party hacks in the aftermath of the SolarWinds breach

January 15, 2021

In the aftermath of the SolarWinds hack, a better understanding of third-party hacks in any update that you provide to your colleagues, bosses, and even the board of directors …

email

Phishers count on remotely hosted images to bypass email filters

January 15, 2021

Loading remotely hosted images instead of embeedding them directly into emails is one of the latest tricks employed by phishers to bypass email filters. Phishers are always …

thief

Fraudulent attempt purchase value decreased by $10 in 2020 compared to 2019

January 15, 2021

There has been a 24 percent increase in eCommerce transactions globally in December 2020 compared to December 2019, ACI Worldwide reveals. In particular, eCommerce …

5G

Revenue for 5G enterprises in the Asia-Pacific region to reach $13.9B by 2024

January 15, 2021

Mega trends across the government and public sector, healthcare, manufacturing, and telecommunications are posing new challenges to end users in vertical industries in the …

bot

Minimizing cyberattacks by managing the lifecycle of non-human workers

January 14, 2021

The number of non-human workers is growing, particularly as global organizations increasingly prioritize cloud computing, DevOps, IoT devices, and other digital transformation …

containers

Most containers are running as root, which increases runtime security risk

January 14, 2021

While container usage reveals organizations are shifting left by scanning images during the build phase, DevOps teams are still leaving their environments open to attack, …

healthcare

Healthcare IT teams battle with technical challenges to ensure network resilience and security

January 14, 2021

IDG surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities. The goal was to shed light on how …

money

Capital projects delayed or put on hold due to pandemic

January 14, 2021

61% of owner-operators of factories, mines, refineries and public, telecommunications and utility infrastructure organizations expect new projects to be delayed or put …

cloud

43% of financial services orgs plan to increase private cloud investments

January 14, 2021

Nutanix announced the financial services industry findings of its report, measuring organizations’ plans for adopting private, hybrid and public clouds. The findings point to …

medical devices

The future history of medical device cybersecurity

January 13, 2021

In 1555, Nostradamus published his famous Les Prophéties containing obfuscated prophecies for the world to come. Some believe that one of these predictions pertains to the …

Posts navigation

1 2 3 4 5 … 2,497
bot

What analytics can unveil about bot mitigation tactics

  • Understanding third-party hacks in the aftermath of the SolarWinds breach
  • Minimizing cyberattacks by managing the lifecycle of non-human workers
Top videoconferencing attacks and security best practices

What's new

week in review

Week in review: Pen testing, Sunspot malware, Microsoft plugs Defender zero-day

gap

Understanding third-party hacks in the aftermath of the SolarWinds breach

email

Phishers count on remotely hosted images to bypass email filters

bot

What analytics can unveil about bot mitigation tactics

Don't miss

bot

What analytics can unveil about bot mitigation tactics

gap

Understanding third-party hacks in the aftermath of the SolarWinds breach

email

Phishers count on remotely hosted images to bypass email filters

bot

Minimizing cyberattacks by managing the lifecycle of non-human workers

containers

Most containers are running as root, which increases runtime security risk

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Securing the connected home: A joint task for homeowners and their ISP
  • Cybersecurity sales: Do you have what it takes to succeed?
  • How do I select a data control solution for my business?
  • How do I select cyber insurance for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise