Please turn on your JavaScript for this page to function normally.
bot
Robotic Process Automation (RPA) adoption hindered by security concerns

Robotic Process Automation (RPA) promises numerous benefits to organizations investing in it, including increased worker productivity, the automation of tedious and monotonous …

password
Top passwords used in RDP brute-force attacks

Specops Software released a research analyzing the top passwords used in live attacks against Remote Desktop Protocol (RDP) ports. This analysis coincides with the latest …

Kangas
Open-source tool puts machine learning dataset analysis at data scientists’ fingertips

Comet released Kangas, an open-source smart data exploration, analysis and model debugging tool for machine learning. Kangas, available on GitHub, helps users understand and …

healthcare
Rallying cybersecurity and healthcare IT to support patient safety

The expansion of cyber-physical systems in healthcare, particularly the IP “heartbeats” dispersed across hospital networks, has stretched cybersecurity beyond its IT legacy of …

Terminal
How to improve secure coding education

Did you know that not one of the top 50 undergraduate computer science programs in the U.S. requires a course in code or application security for majors? Yet the threatscape …

lock
Breaking down data encryption techniques aimed at improving data privacy

In this Help Net Security video, Dana Morris, SVP Product and Engineering at Virtru, talks about privacy-preserving cryptography. He provides an introduction to data …

cloud hand
Cloud data protection trends you need to be aware of

Veeam Software released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), …

biohazard
5 use cases with a malware sandbox

Malware attacks are commonplace today, executing within minutes and causing damage for weeks or months. Rapid detection and swift, effective incident response are essential in …

CIS CSAT Pro
CIS SecureSuite Membership: Leverage proven best practices to improve cybersecurity

Whether you’re facing a security audit or interested in configuring systems securely, CIS SecureSuite Membership is here to help. CIS SecureSuite provides thousands of …

Backstage
Critical vulnerability in Spotify’s Backstage discovered, patched

A critical unauthenticated remote code execution vulnerability in Spotify’s Backstage project has been found and fixed, and developers are advised to take immediate action in …

chess
Creating a holistic ransomware strategy

Recent scientific research into the psychological effects of a ransomware crisis on both organizations and individuals revealed the deep marks that a ransomware crisis leaves …

arrows
Stop audience hijacking and defend against redirection to malicious websites

The holidays are just around the corner, and the competition for consumer attention and dollars promises to be fierce. According to Akamai research, up to 20% of potential …

Don't miss

Cybersecurity news