![terminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194342/terminal1-400x200.jpg)
Half of organizations do not audit SSH entitlements
Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted …
![Bug](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195248/bug-400x200.jpg)
What motivates bug hunters?
Crowdsourced security penetration testing outfit Bugcrowd has released its second annual “Mind of a Hacker” report, to provide insight into bug hunters’ …
![measure](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103540/measure-400x200.jpeg)
Measuring fraud trends across various industries
Businesses across industries are experiencing more sophisticated fraud attempts across multiple customer-not-present channels, according to IDology. Shifting fraud tactics and …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102542/biohazard-400x200.jpg)
Sharp rise in fileless attacks evading endpoint security
A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. …
![ISACA](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102555/isaca-400x200.jpg)
Are your enterprise leaders digitally literate?
Only 53 percent of surveyed business technology professionals believe their organization’s leadership is digitally literate, according to ISACA. The other 47 percent either …
![Radware](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102605/radware-400x200.jpg)
Bot-driven web traffic and its application security impact
New research conducted by the Ponemon Institute, which focused on such highly targeted industries as retail, healthcare and financial services, exposes the proliferation of …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
Mobile devices present a significant risk for GDPR noncompliance
Accessing data from mobile devices presents a significant risk for GDPR noncompliance, according to Lookout. 84 percent of U.S. security and IT executives agree that personal …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102608/healthcare-400x200.jpg)
Is the healthcare industry prepared to combat evolving cyber threats?
One in four UK healthcare IT professionals aren’t confident in their organisation’s ability to respond to cyberattacks, according to Infoblox. Technology is …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
Governments manipulate social media, threaten global Internet freedom
Governments around the world are dramatically increasing their efforts to manipulate information on social media, threatening the notion of the Internet as a liberating …
![gift](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105817/gift-400x200.jpg)
This year’s most hackable holiday gifts
McAfee announced its third annual Most Hackable Holiday Gifts list to help consumers identify potential security risks associated with popular gifts this holiday season. In …
![Node.js Foundation](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105659/nodejs-400x200.jpg)
Node.js security: Are developers confident in the quality of their code?
A NodeSource and Sqreen joint developer survey of nearly 300 CTOs, CIOs and developers revealed that, while the developer community fully understands the risks of operating in …
![hot](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105455/hot-400x200.jpg)
Digital business is turning CIOs into leaders
For 82 percent of EMEA CIOs digital business has led to a greater capacity for change and a more open mindset in their IT organization, according to Gartner‘s annual …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality