cyber risk
Board members and the C-suite need secure communication tools
Board members and the C-suite are key targets for cyber-threat actors, due to their access to highly sensitive information. Yet too many of them are putting their …
Cyber criminals continue to target and exploit people
Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — …
Fraud trends and scam tactics consumers should be aware of
If it seems like you’re receiving more spam than normal, you probably are. Seventy-four percent of consumers say they have received a scam text so far this year, while as many …
How confident are IT pros in the security of their organization’s supply chain?
Over the last two years, supply chain challenges have rocked both enterprises and consumers alike, making it harder to access certain goods and maintain business continuity. …
Strong passwords still a priority strategy for enterprises
Bitwarden announced the results of a global survey of enterprise security decision makers, conducted by 451 Research, which explores enterprise password management practices …
How organizations can protect themselves in the emerging risk landscape
In this video for Help Net Security, Ravi Srinivasan, CEO of Votiro, discusses ThoughtLab’s 2022 cybersecurity benchmarking study, Cybersecurity Solutions for a Riskier …
API security warrants its own specific solution
Application programming interfaces (APIs) enable developers to quickly and easily roll-out services but they’re also equally attractive to attackers. This is because they can …
Top three most critical areas of web security
Akamai Technologies revealed three research reports at the RSA Conference 2022, focusing on three of the most critical areas of web security: ransomware, web applications and …
Barely one-third of IT pros can vet code for tampering
Global research commissioned by ReversingLabs and conducted by Dimensional Research, revealed that software development teams are increasingly concerned about supply chain …
Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level
In this interview for Help Net Security, Mehul Revankar, VP of Product Management & Engineering for VMDR at Qualys, talks about Qualys Vulnerability Management, Detection …
Intelligence is key to strategic business decisions
Businesses have a growing need for greater relevance in the intelligence they use to inform critical decision-making. Currently just 18% of professionals responsible for …
Massive shadow code risk for world’s largest businesses
Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply …
Featured news
Resources
Don't miss
- Researchers reveal OT-specific malware in use and in development
- Malvertising on steroids serves Lumma infostealer
- The shifting security landscape: 2025 predictions and challenges
- Balancing security and user experience to improve fraud prevention strategies
- Serbian government used Cellebrite to unlock phones, install spyware