Help Net Security
Five keys to secure DevOps, cloud and IoT adoption
90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI, according to BeyondTrust. Yet, while enterprises are …
Why creativity is key to security
Similar to corporate auditors and risk and compliance managers, security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business …
Crowdsourced security trends: Payouts to hackers increase
Bugcrowd has released the 2018 Bugcrowd State of Bug Bounty Report, which analyzes proprietary platform data collected from more than 700 crowdsourced security programs …
Photo gallery: Infosecurity Europe 2018 Expo, part 2
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Bomgar, Qualys, Fidelis Cybersecurity, Cisco, Nuvias Group.
Key challenges and frustrations of SOC workers
Technology challenges, hiring and staffing issues, processes and pain points, as well as finance and funding difficulties have the potential to limit the ability of SOCs to …
Qualys streamlines supply chain GDPR compliance assessment with cloud app
Qualys announced new functionality in its Security Assessment Questionnaire (SAQ) cloud app that allows customers to better achieve visibility of data across their own network …
Photo gallery: Infosecurity Europe 2018 Expo
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Qualys, Barracuda Networks, ECSC Group, Forcepoint, Pen …
Most businesses still struggling with mobile working and security
95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and worryingly, 18% suggest their mobile workers don’t care about security, …
Sophisticated keyloggers target the finance industry
Lastline found three separate strains of keylogger malware that are currently targeting finance. Lastline’s analysis of the 100 most recent malware samples found among finance …
The harsh realities of endpoint management
88 percent of IT professionals acknowledge the importance of endpoint management, yet 30 percent don’t know how many they have. LogMeIn released findings of a new global …
UK businesses overlook external providers when developing cyber strategies
Large businesses in the UK could be falling short when it comes to assessing the cyber resilience of external providers within their supply chain network, according to new …
How security leaders can be empowered to drive results
The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be …
Featured news
Resources
Don't miss
- Your encrypted data is already being stolen
- REMnux v8 brings AI integration to the Linux malware analysis toolkit
- LockBit 5.0 ransomware expands its reach across Windows, Linux, and ESXi
- Microsoft equips CISOs and AI risk leaders with a new security tool
- OpenClaw creator Peter Steinberger joins OpenAI