
New technique protects consumers from voice spoofing attacks
Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …

How to protect remote workers from phishing and other attacks
Working from home is a new ‘norm’ for many organizations, but the shift toward remote work has been steadily increasing for the past decade. In fact, between 1996 and 2016 …

Fixing all vulnerabilities is unrealistic, you need to zero in on what matters
As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every …

Consumer security concerns at an all-time high, but priorities have shifted
31% of Americans are concerned about their data security while working from home during the global health crisis, according to a Unisys Security survey. Consumer security …

How do I select a mobile security solution for my business?
The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security …

5 cybersecurity considerations for getting back to work securely
As governments begin lifting emergency orders, company leaders are considering policies, technology and processes that will protect their workforces. Many of these factors …

Cyber readiness has improved, but potential blind spots remain
Businesses are enhancing levels of spending and activity to minimize their vulnerability to cyber incidents and breaches, according to Hiscox. The annual Hiscox Cyber …

Employees are worried about cyber threats in their home office environments
IBM Security released findings from a study focused on the behaviors and security risks of those new to working from home (WFH) during the COVID-19 pandemic. Cyber threats in …

Business functions fail to collaborate on digitization
Many companies do not realize the full value of investing in digital projects due to a lack of collaboration among their critical business functions, according to a study by …

Guide: How to assess your email vulnerability for free in 20 minutes
This guide is no longer available. Attacks delivered via email are extremely common and the fact is that many popular security solutions are just not handling these attacks …

How to secure software in a DevOps world
The COVID-19 pandemic and its impact on the world has made a growing number of people realize how many of our everyday activities depend on software. We increasingly work, …

Keep remote workers and their devices secure with one click
In this interview for Help Net Security, Shailesh Athalye, VP Compliance at Qualys, discusses cloud-based Remote Endpoint Protection and illustrates how security teams can …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse