cybersecurity
![Tesla](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094059/tesla-400x200.jpg)
Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks
Tesla Model S and Model 3 electric cars are vulnerable to cyberattacks aimed at their navigation systems, according to research from Regulus Cyber. Staged attack caused the …
![CEO](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112240/ceo-400x200.jpg)
Executives now recognize cybersecurity as a key business driver
Cybersecurity is now recognized as a key business driver by the C-Suite, according to a new Radware report. Executives that participated in the survey found that the four main …
![mobile device](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111757/mobile-400x200.jpg)
Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps
Recently messaging applications got hit hard with vulnerabilities, hacking attempt disclosures by nation-states and insider employee inappropriate behaviors. As organizations …
![Password](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095338/password_field-400x200.jpg)
Insecure password memory aids: A passwordless future could be the solution
There is a readiness for passwordless security methods such as biometrics, with 70% workers believing biometrics would benefit the workplace, according to Okta. The …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
Why phishing education has never been more critical to your business
Our cyber defenses are becoming stronger and stronger every year. Even the smallest companies can now deploy advanced anti-malware and intrusion detections tools that were, …
![container](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102319/container-400x200.jpg)
What does runtime container security really mean?
End-to-end protection for containers in production is required to avoid the steep operational and reputational costs of data breaches. As news of container attacks and fresh …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
Human error still the cause of many data breaches
With the incidence of reported data breaches on the rise, more than half of all C-suite executives (C-Suites) (53%) and nearly three in 10 Small Business Owners (SBOs) (28%) …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100522/industrial-400x200.jpeg)
Organizations are advancing their efforts, investing in OT cybersecurity programs
ICS cybersecurity threats remain high and present evolving challenges, a new SANS report reveals. However, since the last SANS OT/ICS report released in 2017, a growing …
![gamer](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095510/gamer-400x200.jpg)
The gaming community is a rising target for credential stuffing attacks
Hackers have targeted the gaming industry by carrying out 12 billion credential stuffing attacks against gaming websites within the 17-month period analyzed in the report …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100613/EU-lock2-400x200.jpg)
GDPR implementation lessons can help with CCPA compliance
The ever increasing number of data breaches has made consumers more aware of how their data is being used and has emphasized the importance of keeping personal data private, …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103351/businessman-400x200.jpg)
CISO do’s and don’ts for board reporting
Security is no longer just a job for IT – it impacts all areas of a business, from brand perception to the bottom line. As a result, CISOs are increasingly being asked to …
![healthcare professionals](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102209/healthcare-professionals-400x200.jpg)
Healthcare executives need to make cybersecurity a business priority
Risks associated with Internet of Things, medical devices, third-party vendors, and program management are top of mind for healthcare executives, according to a CynergisTek’s …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history