• News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter
(IN)SECUREMagazine
 

News

Get our Top Stories to your inbox
programmer

Three reasons employee monitoring software is making a comeback

  • February 15, 2019
  • cybersecurity
  • monitoring
  • privacy

Companies are increasingly implementing employee and user activity monitoring software to: Ensure data privacy Protect intellectual property and sensitive data from falling …

bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • February 15, 2019
  • artificial intelligence
  • CISO
  • cybersecurity

In this Help Net Security podcast, Chris Morales, Head of Security Analytics at Vectra, talks about machine learning fundamentals, and illustrates what cybersecurity …

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

  • February 15, 2019
  • Azure AD Identity Protection
  • enterprise
  • identity protection

Launched in September 2018, Microsoft Threat Protection (MTP) integrates a number of Microsoft services to provide a fully integrated, end-to-end solution for securing the …

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

  • February 15, 2019
  • artificial intelligence
  • code review
  • Firefox

Mozilla will start using Clever-Commit, an AI coding assistant developed by Ubisoft, to make the Firefox code-writing process more efficient and to prevent the introduction of …

hand

Increased appetite for biometrics fueled by speed, security and convenience

  • February 15, 2019
  • authentication
  • biometrics
  • CISO

The Biometric Consumer Sentiment Survey of more than 1,000 U.S. adults who have experience using biometrics to log into their accounts, reveals an increased appetite for the …

business

SaaS spending increasing by 78 percent year-over-year

  • February 15, 2019
  • application security
  • Blissfully
  • cybersecurity

43% of the average company’s SaaS application stack changed in the last two years, according to the 2019 Annual SaaS Trends report. This is far greater than the typical …

puzzle

How organizations handle disruptive data sources

  • February 15, 2019
  • cloud adoption
  • cybersecurity
  • data security

In the 2018 Data Connectivity Survey by Progress, more than 1,400 business and IT professionals in various roles across industries and geographies shared their insights on the …

vault

Bank of Valletta suspended all operations in wake of cyber attack

  • February 14, 2019
  • banks
  • cybercrime
  • EU

Maltese Bank of Valletta (BOV) has been breached by hackers and has temporarily suspended all of its operations to minimize risk and review its systems. The bank shuttered its …

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

  • February 14, 2019
  • credentials
  • cybercrime
  • data theft

Along with Emotet, Trickbot has become one of the most versatile and dangerous pieces of modular malware hitting enterprise environments. Most recently, its creators have …

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

  • February 14, 2019
  • CISO
  • cyber risk
  • cyberattack

80 percent of IT business leaders anticipate a critical breach or successful cyberattack over the coming year, according to the Cyber Risk Index (CRI), a Trend Micro survey of …

Posts navigation

1 2 3 4 5 6 … 2,679 Next
bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
Spot
light
NIST Cybersecurity Framework: Five years later

What's New

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

puzzle

How organizations handle disruptive data sources

hand

Increased appetite for biometrics fueled by speed, security and convenience

business

SaaS spending increasing by 78 percent year-over-year

bot

Machine learning fundamentals: What cybersecurity professionals need to know

programmer

Three reasons employee monitoring software is making a comeback

vault

Bank of Valletta suspended all operations in wake of cyber attack

Don't miss

programmer

Three reasons employee monitoring software is making a comeback

bot

Machine learning fundamentals: What cybersecurity professionals need to know

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

hand

Increased appetite for biometrics fueled by speed, security and convenience

vault

Bank of Valletta suspended all operations in wake of cyber attack

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Linux

Snapd flaw gives attackers root access on Linux systems

patch

February 2019 Patch Tuesday: PrivExchange hole plugged

question

SMBs spending a day each week dealing with cybersecurity issues

users

Nearly two-thirds of organizations say tech skills gap is impacting IT audits

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2019 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter

Copyright 1998-2019 by Help Net Security | Read our privacy policy | About us | Contact | Advertise

Design by FatDUX