Please turn on your JavaScript for this page to function normally.
search
Increasing speed of vulnerability scans ultimately increases security fixes overall

Next-generation static application security testing (SAST) and intelligent software composition analysis (SCA) can increase the speed of vulnerability scans and narrow their …

hunt
CyberCops program: ROTC students as future cybersecurity gatekeepers

Not so long ago, a strong password felt mighty enough to keep you safe and your computer data private. But we now live amid heightened risks in malware, phishing, …

Tomislav Pericin
The destructive power of supply chain attacks and how to secure your code

In this Help Net Security podcast, Tomislav Peričin, Chief Software Architect at ReversingLabs, explains the latest and most destructive supply chain attacks, their techniques …

arrows
RIP guest access, long live shared channels!

While many yearn to return to pre-pandemic days, some aspects of our new normal are welcome. Most notable is the flexibility of hybrid working, with a great majority of …

cloud complexity
How to build a zero-trust cloud data architecture

Cloud computing has had a profound impact on CISOs. They realize its cheap storage, immense scalability, resource elasticity and accessibility from anywhere in the world, at …

DDoS
Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack …

dark
Cybercriminals are manipulating reality to reshape the modern threat landscape

VMware released a report which analyzes how cybercriminals are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive …

Code
Ineffective software delivery costing businesses up to $126 million per year

Businesses may be sacrificing up to $126 million in revenue per year due to ineffective software delivery, according to a CircleCI study. Surveying more than 2,000 business …

5G
5G infrastructure market size to reach $80.5 billion by 2028

The global 5G infrastructure market size is expected to reach $80.5 billion by 2028, according to a study by Grand View Research. It is expected to expand at a CAGR of 49.8% …

SAP
SAP S/4HANA adoption rebounds as enterprises look to minimize business disruption

U.S. adoption of SAP S/4HANA has rebounded after slowing for most of 2020 as the COVID-19 pandemic stalled digital transformations, according to a report published by …

CISSP Flash Cards
Are you ready for the CISSP exam?

Find out with the Official (ISC)² CISSP Flash Cards. Study for the CISSP exam anytime, anywhere using this FREE interactive self-study tool that tests knowledge across all …

Group-IB Digital Risk Protection
Review: Group-IB Digital Risk Protection

The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and …

Don't miss

Cybersecurity news