cybersecurity
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093803/cloud-drive1-400x200.jpg)
52% of companies use cloud services that have experienced a breach
Seventy-nine percent of companies store sensitive data in the public cloud, according to a McAfee survey. Anonymized cloud event data showing percentage of files in the cloud …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
Recommendations for navigating the dynamic cybercrime landscape
In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, talks about the most pressing issues CISOs are dealing with in today’s fast-paced …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101820/windows-computer-400x200.jpg)
You can upgrade Windows 7 for free! Why wouldn’t you?
“Doomsday is here! The sky is falling! Windows 7 is out of support and all hell will break loose!” – or, at least, that’s what some cybersecurity experts and press outlets …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101017/healthcare-1-400x200.jpg)
Patients believe stronger privacy protections are more important than easier health data access
Patients and consumers deserve better access to personalized, actionable health care information to empower them to make better, more informed decisions – but it should not …
![Microsoft impersonate](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100534/microsoft-impersonate-400x200.jpg)
Lessons from Microsoft’s 250 million data record exposure
Microsoft has one of the best security teams and capabilities of any organization in the technology industry, yet it accidentally exposed 250 million customer records in …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093759/arrow-400x200.jpg)
CISOs: Make 2020 the year you focus on third-party cyber risk
While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Over half of organizations were successfully phished in 2019
Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
More authentication and identity tech needed with fraud expected to increase
The proliferation of real-time payments platforms, including person-to-person (P2P) transfers and mobile payment platforms across Asia Pacific, has increased fraud losses for …
![Citrix](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/23145946/citrix-logo-red2-400x200.jpg)
IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781
Citrix and FireEye have teamed up to provide sysadmins with an IoC scanner that shows whether a Citrix ADC, Gateway or SD-WAN WANOP appliance has been compromised via …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100823/user-400x200.jpg)
Cybercriminals using fake job listings to steal money, info from applicants
Be extra careful when looking for a job online, the Internet Crime Complaint Center (IC3) warns: cybercriminals are using fake job listings to trick applicants into sharing …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093605/zero-400x200.jpg)
Zero Trust: Beyond access controls
As the Zero Trust approach to cybersecurity gains traction in the enterprise world, many people have come to recognize the term without fully understanding its meaning. One …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
There is no easy fix to AI privacy problems
Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality