cybersecurity
![ImmuniWeb Discovery](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/18170038/immuniweb_discovery-400x200.jpg)
Product showcase: ImmuniWeb Discovery – attack surface management with dark web monitoring
Organizations around the globe struggle to identify their IT assets hosted in a multicloud environment, on premise or managed by numerous third parties. The lack of visibility …
![riskiest connected devices](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/12121516/riskiest_connected_devices-400x200.jpg)
The most dangerous connected devices
The growing number and diversity of connected devices in every industry present new challenges for organizations to understand and manage the risks they are exposed to. In …
![Tails](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/19082014/tails-os-400x200.jpg)
Secure portable operating system Tails 5.5 released
Tails, based on Debian GNU/Linux, is a portable operating system that protects against surveillance and censorship, and version 5.5 is now available for download. When …
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
Upgrade your security awareness efforts: Here’s how to start
October is Security Awareness Month, an exciting time as organizations around the world train people how to be cyber secure, both at work and at home. But what exactly is …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/18150523/hands-data-security-400x200.jpg)
How to secure microservices using authorization
IT organizations looking to continue their digital transformation journey are faced with a choice – choosing between a more cost-effective, simple monolithic system or a more …
![car](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105029/cars-many-400x200.jpg)
Police breaks up criminal ring that hacked keyless systems to steal cars
A car theft ring that used fraudulent software to “hack” and steal vehicles with remote keyless entry and ignition systems has been dismantled by the French …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103446/healthcare-400x200.jpeg)
7 critical steps to defend the healthcare sector against cyber threats
While knowing full well that human lives may be at stake, criminal gangs have been increasingly targeting the healthcare sector with high-impact attacks like ransomware. 1. …
![deepfakes](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/12140127/deepfakes-hns-400x200.jpg)
Deepfakes: What they are and how to spot them
The term “deepfake” is used for photo, video or audio content that has been manipulated to make it seem that the subject is doing or saying something they never did or said. …
![Scribe Security](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/12090631/scribe_security-400x200.jpg)
Product showcase: Scribe platform’s end-to-end software supply chain security
As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams are more challenged than ever to build transparent trust in the software …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
Economic uncertainty is increasing cybersecurity risks
Cybercriminals are always seeking to make their attacks, scams and campaigns as effective as possible. This includes harnessing whatever is dominating the news agenda and is …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/18150523/hands-data-security-400x200.jpg)
3 mistakes organizations make when trying to manage data securely
Data security is complex. With each day, there is an increase in data volume, data type, and data source or storage. Yet, despite all of the technological advancements in this …
![RedEye](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/15145034/redeye-cisa-1280-400x200.jpg)
CISA releases RedEye open-source analytic tool
CISA has released RedEye, an interactive open-source analytic tool to visualize and report Red Team command and control activities. RedEye, available on GitHub, allows an …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history