cybersecurity
![Action1 RMM](https://img.helpnetsecurity.com/wp-content/uploads/2021/07/16142226/action1-rmm-400x200.jpg)
Product showcase: Action1 RMM
Since the abrupt shift to remote work, effective endpoint management has become a top challenge in enterprise security. Patching and maintaining laptops and computers, …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02103956/back-up-data-400x200.jpg)
A unified approach is the future of data backup
Though disaster recovery and backup solutions have always been critical components for any business, the pandemic put a spotlight on the many threats to data today. Cybercrime …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100228/ddos-400x200.jpg)
DDoS attacks increased 33% in H1 2021
There has been a 33% increase in the number of DDoS attacks in H1 2021, according to a report published by Link11. Between January and June, there were record numbers of …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113326/vault-400x200.jpg)
Image encryption technique could keep photos safe on popular cloud photo services
The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A study from computer scientists at Columbia Engineering …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Most companies still rely on manual tools and tech for internal audit processes
Despite volatility of the risk landscape in the wake of the COVID-19 pandemic, most organizations still rely on manual tools and technologies for internal audit processes, a …
![fake](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/05115559/fake1-400x200.jpg)
Combating deepfakes: How we can future-proof our biometric identities
How worried should we be about deepfakes? What sort of threat do they pose to digital ID verification and the biometric technology that we are becoming so reliant on, and are …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Is differential privacy the ideal privacy-enhancing computation technique for your business?
As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105208/alert-400x200.jpg)
IoT malware attacks rose 700% during the pandemic
Zscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The …
![mobile devices](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112718/mobile_devices-400x200.jpg)
Most financial services mobile apps still rely on passwords, even with added friction
Incognia announced a report which highlights results from their most recent study focusing on authentication and friction at login and the password reset process. The study …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103509/IoT-400x200.jpg)
ETSI completes set of IoT MQTT and CoAP testing standards
The ETSI committee on Methods for Testing and Specifications (TC MTS) has recently completed a first set of seven standards addressing the testing of the IoT MQTT and CoAP …
![market](https://img.helpnetsecurity.com/wp-content/uploads/2021/07/13153041/business-market-2021-400x200.jpg)
CSaaS market to reach valuation of $87.59 billion by 2025
The threat quotient over the internet has increased phenomenally over the years. According to a survey by Risk Based, data breaches exposed nearly 4.1 bn records only in the …
![MITRE ATT&CK](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/15120235/mitre-attack-400x200.jpg)
MITRE Engenuity launches ATT&CK Evaluations for ICS
MITRE Engenuity today released results from its first round of independent ATT&CK Evaluations for Industrial Control Systems (ICS). The evaluations examined how …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality