cybersecurity
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100701/chess-400x200.jpeg)
Stop thinking of cybersecurity as a problem: Think of it as a game
COVID-19 changed the rules of the game virtually overnight. The news has covered the broader impacts of the pandemic, particularly the hit to our healthcare, the drops in our …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092913/keys-400x200.jpg)
Encryption-based threats grow by 260% in 2020
New Zscaler threat research reveals the emerging techniques and impacted industries behind a 260-percent spike in attacks using encrypted channels to bypass legacy security …
![Intel](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/10175240/intel-inside-blue-400x200.jpg)
New side-channel attacks allow access to sensitive data on Intel CPUs
An international team of security researchers is presenting new side-channel attacks (CVE-2020-8694 and CVE-2020-8695), which use fluctuations in software power consumption to …
![account](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/21085008/account-hand-400x200.jpg)
The evolving role of the CTO
Since spending more time at home, my appetite for reading has increased. In fact, I recently picked up again one of my favorites – J. R. R. Tolkein’s Lord of the Rings …
![Oracle](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/09132349/oracle-code-400x200.jpg)
Most UK businesses using Oracle E-Business Suite are running old systems
The majority of UK businesses using Oracle E-Business Suite (EBS) are running on old versions of the business critical ERP system, according to a Claremont study. Of the 154 …
![ISC2 report](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09090807/isc2-report-400x200.jpg)
What’s stopping job seekers from considering a career in cybersecurity?
The cybersecurity industry no longer has an image problem, but many things are still stopping individuals from considering a career in cybersecurity: a high cost of entry (the …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093250/lock-400x200.jpg)
End-to-end encrypted communication mitigates enterprise security risk and ensures compliance
It is a mathematical certainty that data is more protected by communication products that provide end-to-end encryption (E2EE). Yet, many CISOs are required to prioritize …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
Every employee has a cybersecurity blind spot
80% of companies say that an increased cybersecurity risk caused by human factors has posed a challenge during the COVID-19 pandemic, particularly in times of heightened …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
Exploring the progress organizations are making in their investments towards digital resiliency
Overall investments in digital resiliency have increased steadily throughout the year as businesses prioritize or accelerate adoption of cloud, collaborative, and digital …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14193534/patch-400x200.jpg)
November 2020 Patch Tuesday forecast: Significant OS changes ahead
November Patch Tuesday and the end-of-year holidays are rapidly approaching. Microsoft gave us a late release or maybe an early gift depending upon how you look at the new …
![block](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/30103707/block-orange-400x200.jpg)
Quantum computers: How to prepare for this great threat to information security
The race is on to build the world’s first reliable and truly useful quantum computer, and the finish line is closer than you might think – we might even reach it this …
![fake](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/05115559/fake1-400x200.jpg)
How fake news detectors can be manipulated
Fake news detectors, which have been deployed by social media platforms like Twitter and Facebook to add warnings to misleading posts, have traditionally flagged online …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality