Help Net Security
How businesses use data might not be popular with the public
A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect …
Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk
Cato Networks announced the results of its analysis of 263 billion enterprise network flows between April and June 2021. Researchers showed a novel use of Houdini malware to …
Remote working positively impacting employee experience
Globalization Partners announced the findings of its survey which focused on the sentiment of people working on global teams. 63 percent of respondents say their companies …
How building a world class SOC can alleviate security team burnout
For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …
Most organizations experienced at least one ransomware attack, multiple attacks very common
One third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell …
SASE market size to reach $11.29 billion by 2028
The global secure access service edge (SASE) market size is expected to reach $11.29 billion by 2028, registering a CAGR of 36.4%, a ResearchAndMarkets report reveals. The …
Digital fraud attempts on the rise: Gaming, travel and leisure most targeted
As the prevalence of digital fraud attempts on businesses and consumers continues to rise, TransUnion’s analysis found that fraudsters are re-focusing their efforts from …
ESG regulatory requirements present risk but also opportunities
Regulatory risk related to environmental, social and governance (ESG) disclosures has rapidly risen to the second overall position in Gartner’s latest report. ESG regulatory …
65 vendors affected by severe vulnerabilities in Realtek chips
A vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems and other network devices. The chips …
How to foster collaboration with the IT team for a successful zero trust implementation
The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …
Even the US president wants zero trust: Here’s how to make it a reality
President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively …
Demand for data is growing, but so are data supply chain challenges
Data suppliers are unable to efficiently deliver relevant data to a growing number of data consumers, according to a 451 Research survey. 55% of those surveyed report that …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)