searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

News

Get our top stories in your inbox
tracking

CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses

February 24, 2021

As browser-makers move to defang third-party (tracking) cookies, marketers are increasingly switching to alternative tracking techniques. One of these is CNAME cloaking, which …

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?

February 24, 2021

In 2020, the pandemic was a radical turning point in the way we work. Office workers were forced to give up their commute and work from home. People from a whole range of …

template

Third-party risk management programs still largely a checkbox exercise

February 24, 2021

Enterprise third-party risk management (TPRM) programs have been around for a half-decade or longer, and at this point most large organizations run one. However, many of these …

target

U.S. municipalities are the perfect target for cybercriminals in 2021

February 24, 2021

On Feb 5th, 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, and was able to adjust the amount of sodium hydroxide in the water from 100 …

shark

Most businesses see state-sponsored cyberattacks as a major threat

February 24, 2021

A majority of businesses surveyed for a study by the Economist Intelligence Unit (EIU) and the Cybersecurity Tech Accord, see state-led and sponsored cyberattacks as a major …

mobile apps

Researchers propose more secure and private mobile contact tracing

February 24, 2021

For public health officials, contact tracing remains critical to managing the spread of the coronavirus — particularly as it appears that variants of the virus could be …

Pradeo EDR

Whitepaper – EDR to secure mobile devices: Coverage, limits & recommendations

February 24, 2021

The digitalization of services and expansion of remote working has heightened the number of off-premises users accessing cloud-based resources from their mobile device. In …

attacks

Accellion FTA attacks, extortion attempts might be the work of FIN11

February 23, 2021

Mandiant/FireEye researchers have tentatively linked the Accellion FTA zero-day attacks to FIN11, a cybercrime group leveraging CLOP ransomware to extort targeted …

lock

Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations

February 23, 2021

After earning his master’s degree in computer science and working on the IT side of the business at a number of large financial services organizations, Bobby Balachandran …

Eyes

Physical cyber threats: What do criminals leave when they break in? 

February 23, 2021

Many organizations have maintained heavy investment in cybersecurity over the last year, even in an unpredictable time when other spending has faltered. Gartner estimates that …

bomb

Adversaries exploit supply chains, double down on COVID-19 and ransomware

February 23, 2021

Supply chain attacks, ransomware, data extortion and nation-state threats prove to be more prolific than ever, a CrowdStrike report suggests. eCrime attacks made up 79% of all …

cloud

Top cloud infrastructure risks faced by real-world organizations

February 23, 2021

There’s an increased adoption of managed infrastructure services and the emergence of new cloud watering hole attacks, Accurics reveals. Of all violations identified, 23 …

Posts navigation

1 2 3 4 5 6 7 … 2,515
tools

Protecting the digital workplace with an integrated security strategy

  • How do I select a cloud security solution for my business?
  • Closing the data divide: How to create harmony among data scientists and privacy advocates
Free certification Exam Action Plan from (ISC)²

What's new

industrial

Critical flaw in Rockwell PLCs allows attackers to fiddle with them (CVE-2021-22681)

analyst

Most IT security leaders lack confidence in their company’s security posture

world

Insights for navigating a drastically changing threat landscape

tools

Protecting the digital workplace with an integrated security strategy

Don't miss

industrial

Critical flaw in Rockwell PLCs allows attackers to fiddle with them (CVE-2021-22681)

tools

Protecting the digital workplace with an integrated security strategy

cloud

How do I select a cloud security solution for my business?

world

Insights for navigating a drastically changing threat landscape

search

Closing the data divide: How to create harmony among data scientists and privacy advocates

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise