cybersecurity
![template](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093222/template-400x200.jpg)
Third-party risk management programs still largely a checkbox exercise
Enterprise third-party risk management (TPRM) programs have been around for a half-decade or longer, and at this point most large organizations run one. However, many of these …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103023/target-400x200.jpg)
U.S. municipalities are the perfect target for cybercriminals in 2021
On Feb 5th, 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, and was able to adjust the amount of sodium hydroxide in the water from 100 …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
Most businesses see state-sponsored cyberattacks as a major threat
A majority of businesses surveyed for a study by the Economist Intelligence Unit (EIU) and the Cybersecurity Tech Accord, see state-led and sponsored cyberattacks as a major …
![mobile apps](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102223/mobile-apps-400x200.jpg)
Researchers propose more secure and private mobile contact tracing
For public health officials, contact tracing remains critical to managing the spread of the coronavirus — particularly as it appears that variants of the virus could be …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
Physical cyber threats: What do criminals leave when they break in?
Many organizations have maintained heavy investment in cybersecurity over the last year, even in an unpredictable time when other spending has faltered. Gartner estimates that …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092733/bomb-400x200.jpg)
Adversaries exploit supply chains, double down on COVID-19 and ransomware
Supply chain attacks, ransomware, data extortion and nation-state threats prove to be more prolific than ever, a CrowdStrike report suggests. eCrime attacks made up 79% of all …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Top cloud infrastructure risks faced by real-world organizations
There’s an increased adoption of managed infrastructure services and the emergence of new cloud watering hole attacks, Accurics reveals. Of all violations identified, 23 …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101119/zero-400x200.jpg)
Worldwide zero trust security market size to reach $51.6 billion by 2026
The global zero trust security market size is projected to grow from $19.6 billion in 2020 to $51.6 billion by 2026, recording a compound annual growth rate (CAGR) of 17.4% …
![PCI](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/08101515/pci-compliance-400x200.jpg)
PCI SSC releases PCI Secure Software Lifecycle (SLC) Standard 1.1
The PCI Security Standards Council (PCI SSC) has published version 1.1 of the PCI Secure Software Lifecycle (SLC) Standard and its supporting program documentation. The PCI …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Database encryption: Protecting the crown jewels
Databases are the lifeblood store of information for every organization. Without them, the organization’s efficiency, productivity and scope to prosper would be curtailed …
![network monitoring](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/18093404/network_monitoring_world-400x200.jpg)
How do I select a network monitoring solution for my business?
A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will …
![Mask](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/27144910/face-mask-black-400x200.jpg)
10 COVID-19-related lessons for future-ready cybersecurity
In 2020, we experienced wave after wave of COVID-19 surges and watched failure after failure at practicing what we knew were effective preventative measures. Similarly, in …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality