cybersecurity
![USB-Lock-RP](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/07151835/usb-lock-rp-gui-400x200.jpg)
Product showcase: USB-Lock-RP
USB ports in any organization’s network need to be controlled because connected devices such as USB drives and smartphones can be used to transfer malware to computers …
![Zoom](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/09141444/zoom-hands-bkg-400x200.jpg)
Most zoombombing incidents are inside jobs
Most zoombombing incidents are “inside jobs” according to a study featuring researchers at Binghamton University, State University of New York. As the COVID-19 …
![SecOps](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/02172811/secops-gears-400x200.jpg)
COVID-19 impact on SecOps: Increased threats, greater investments in automation
Siemplify released a research that studies how the sudden shift to remote work during the COVID-19 pandemic has affected SecOps analysts’ ability to perform their jobs and the …
![MITRE ATT&CK](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/08092215/mitre-attck-400x200.jpg)
Three ways MITRE ATT&CK can improve your organizational security
There’s a good reason everyone’s talking about MITRE ATT&CK: it’s an objective, third-party standard with which organizations can measure their own detection coverage, as …
![Cybersecurity risk management](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092752/cybersecurity_risk_management-400x200.jpg)
Organizations can no longer afford a reactive approach to risk management
Board members and C-suite executives around the globe are most concerned in 2021 with risks associated with COVID-19-related government policies and regulations, economic …
![remote workforce protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/08091029/remote_workforce_protection2-400x200.jpg)
Empowering a remote workforce is a top priority for CEOs
A top challenge for many CEOs over the next few years is managing a remote workforce, a new IBM Institute for Business Value (IBV) study reveals. CEOs of outperforming …
![fake news](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/26081524/red-fake_news-400x200.jpg)
Researchers develop approach that can recognize fake news
Social media is increasingly used to spread fake news. The same problem can be found on the capital market – criminals spread fake news about companies in order to …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112845/person-400x200.jpg)
Identity verification market to grow steadily in the next few years
The identity verification market is expected to grow at a CAGR of 13.1% over the forecast period 2020 to 2025, according to ResearchAndMarkets. Adoption of solutions through …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102207/connected_car-400x200.jpg)
The transportation sector needs a standards-driven, industry-wide approach to cybersecurity
Despite the uncertainties of the last year, the transformation of the transportation sector forged ahead, dominated by the prevailing trend of CASE (Connected, Autonomous, …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Data loss prevention strategies for long-term remote teams
Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110009/industry-400x200.jpg)
Number of ICS vulnerabilities disclosed in 2020 up significantly
Throughout the second half (2H) of 2020, 71% of industrial control system (ICS) vulnerabilities disclosed were remotely exploitable through network attack vectors, according …
![Terminal](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102852/terminal-keys-400x200.jpg)
Enterprises average one root access orphan key on every enterprise server
SSH machine identities are critical to digital transformation strategies, as they authenticate privileged access between machines and are ubiquitous across enterprise …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality