Help Net Security
Compliance failures caused by lack of embedded controls into employee processes
Compliance teams that don’t embed their controls into employee processes face a significantly higher rate of compliance failures, according to a survey by Gartner. The survey …
Organizations struggling to develop cloud applications that meet security requirements
According to a Security Compass research, in mid-sized to large enterprises, 50% of the software applications being developed are cloud based, and another 30% are expected to …
The surge in the size of server estates putting DBAs under pressure
Data professionals are under more pressure than ever, maintaining the performance of fast-growing server estates, managing cloud migrations, meeting increased security and …
Hybrid working is here to stay, but at what cost?
The COVID-19 pandemic continues to shape our working practices and attitude towards work, with both workers and leaders calling for continued and permanent changes in how and …
Top tips for preventing SQL injection attacks
In the wake of the Colonial Pipeline attack and other high-profile cases, IT teams may be scrabbling to shore up their endpoint protection. But those in the developer …
Crypto exchanges and their customers must protect themselves as attacks continue
Within the past several years, cryptocurrency has gone from a niche hobby to a mainstream concern. Cryptocurrencies like Bitcoin, Ethereum, and even Dogecoin have generated …
Upskilling initiatives could close the technology skills gaps uncovered by remote work
Technology challenges introduced by the COVID-19 pandemic and the emerging trend of remote work uncovered technology skills gaps at many organizations, which in turn required …
Cloud computing market to reach $1,251.09 billion by 2028
The global cloud computing market size is expected to reach $1,251.09 billion by 2028, registering a CAGR of 19.1% over the forecast period, according to a study conducted by …
Report: The State of Password Security in the Enterprise
A recent Authentication Security Strategy survey by Enzoic and Redmond magazine revealed insights into the way that passwords are currently being used in various …
Securing your WordPress website against ransomware attacks
It’s no surprise to anyone who works in security that there’s been an explosion in ransomware incidents over the last two years, costing companies across various industries …
The age of AI-powered devices at the edge
The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that rely on …
Traditional SIEM platforms no longer meet the needs of security practitioners
Panther Labs released the findings from their report which surveyed over 400 security professionals who actively use a SIEM platform as part of their job, including CISOs, …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)