
Mobile stalkerware is on the rise
Mobile stalkerware, which is software silently installed by stalkers onto victims’ mobile devices without their knowledge, is on the rise, an ESET research finds. In 2019, …

Collaboration between network access brokers and ransomware actors deepens
In this Help Net Security podcast, Brandon Hoffman, CISO at Intel 471, discusses about the increased collaboration between network access brokers (NAB) and ransomware …

Do customers have a right to know how companies that use algorithms make their decisions?
Increasingly, businesses rely on algorithms that use data provided by users to make decisions that affect people. For example, Amazon, Google, and Facebook use algorithms to …

Privacy regulations making cloud migration complex
Digital transformation is driving multi-cloud migrations, as 85 percent of organizations use at least two cloud providers for data storage and analytics, while 40 percent use …

Data growth as the number one storage management challenge
Datadobi released a report by 451 Research which reveals the major impact that data growth is having on storage management, highlighting the rise in retention of unstructured …

A picture is worth a thousand words, but to hackers, it’s worth much more
Enterprises and end-users are constantly reminded of the dangers associated with clicking on unknown links and documents. Images rarely top the list as would-be …

Kubernetes adoption continues to grow
Portworx released findings from its survey which assesses the mass adoption and evolution of Kubernetes usage among enterprise users in the last 12 months, in addition to the …

APIs in the insurance industry: Accessing a growing world of data
The insurance industry is vast and varied. It can be found in nearly every country in the world, with the earliest references dating back as early as 1750 BC. Modern …

Research directions in cybersecurity to support a digital strategic autonomy
Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the EU Cybersecurity Strategy. In an effort to support this …

Improper cloud IAM leaving organizations at risk
There is an industry-wide cloud permissions gap crisis, leaving countless organizations at risk due to improper identity and access management (IAM), a CloudKnox Security …

Machine learning-powered cybersecurity depends on good data and experience
According to IDG’s 2020 Cloud Computing Study, 92% of organizations have at least some sort of cloud footprint in regard to their IT environment. Therefore, traditional cloud …

Cybersecurity guide for the hospitality industry
A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive …