Help Net Security
Week in review: 5 popular cybersecurity exploitation techniques, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 69 released (IN)SECURE Magazine is a free …
How to strike the balance between privacy and personalization in healthcare and beyond
The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …
The rise of the Developer Experience Engineer, and why it matters
In a world that increasingly relies on digital products, software development is becoming the catalyst for value creation and achieving top-line business results. At each …
Physical threats increase as employees return to the office
As COVID-19 vaccinations continue, companies embrace hybrid work, employees return to the office and the U.S. opens up, violence and physical threats to businesses are …
57% of reported incidents are caused by insiders
Insider data breaches were the top cause of data and cybersecurity incidents reported in the first quarter of 2021, according to the ICO. 57% of reported incidents were caused …
Governance metrics lagging in ESG reporting across major organizations
An analysis of S&P 500 companies’ environmental, social and governance (ESG) reporting revealed that governance metrics comprised just 8% of all referenced metrics across …
Move to all-flash object storage to occur within five years
Scality announced the results of a Vanson Bourne survey completed by IT decision makers across the UK, France and Germany. It revealed a fundamental shift in the industry …
(IN)SECURE Magazine issue 69 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 69 has been released today. It’s a free …
22% of exploits for sale in underground forums are more than three years old
Trend Micro released a research urging organizations to focus patching efforts on the vulnerabilities that pose the greatest risk to their organization, even if they are years …
The real cost of MSSPs not implementing new tech
Enterprises have plenty to manage as their infrastructures scale with a growing and increasingly complex cloud computing environment. They often bring in expert help to ensure …
Multi-cloud environments creating additional security challenges
Tripwire announced the results of a research report that evaluated cloud security practices across enterprise environments in 2021. Conducted by Dimensional Research, the …
Cybercriminals customizing malware for attacks on virtual infrastructure
Cyber incidents continue to rise, ransomware accounts for nearly two-thirds of all malware attacks, and more cybercriminals are customizing malware for attacks on virtual …