![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093217/DevOps-400x200.jpg)
Most DevOps pros feel proper certificate issuance policies slow them down
75% of DevOps professionals are concerned that policies for issuing certificates slow down development, and over a third (39%) believe developers should be able to circumvent …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110808/usb-400x200.jpg)
Majority of IT departments leave major holes in their USB drive security
For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093937/email-400x200.jpg)
Companies still don’t understand the importance of DMARC adoption
By implementing DMARC, brands lower the odds of their domains being spoofed and used for phishing attacks on recipients. Still, 79.7% of all domains analyzed have no DMARC …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094202/iphone2-400x200.jpg)
Most organizations plan to adopt new authentication solutions within two years
Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104830/microsoft-400x200.jpg)
Microsoft rolls out new tools for enterprise security and compliance teams
Microsoft has announced a number of new capabilities and improvements for tools used by enterprise administrators. New Microsoft 365 security and compliance centers The new …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104830/microsoft-400x200.jpg)
Microsoft will extend GDPR rights to customers worldwide
Microsoft has announced it will extend the rights that are at the heart of GDPR to all of their consumer customers worldwide. “Known as Data Subject Rights, they include …
![White House](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101100/white_house-400x200.jpg)
White House eliminates Cybersecurity Coordinator role
The White House has eliminated the role of Cybersecurity Coordinator, generally viewed as the top cybersecurity role in the US government. The decision was made by John …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102329/usb-400x200.jpg)
IBM employees banned from using portable storage devices
In an attempt to minimize sensitive data loss, IBM will try out a worldwide, company-wide ban on the use of removable portable storage devices such as USB sticks, SD cards, …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
Netflix, Dropbox promise not to sue security researchers, with caveats
Netflix and Dropbox have both noted recently that they won’t sue security researchers who find and disclose vulnerabilities in their products. The only caveat is: the …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104929/iot-400x200.jpg)
How can we build a secure IoT world?
We have almost daily proof that the Internet of Things, as it is now, is a minefield of security issues that are just waiting to be exploited. The unfortunate reality is that …
![satellite](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110521/satellite-1-400x200.jpg)
We have to start thinking about cybersecurity in space
With all the difficulties we’ve been having with securing computer systems on Earth, the cybersecurity of space-related technology is surely the last thing on security …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
US gets federal guidelines for safe deployment of self-driving cars
The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD