![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Cybercriminals focus on the shipping and cloud storage sectors
The Anti-Phishing Working Group’s latest report found upticks in phishing attacks against companies in the Logistics & Shipping as well Cloud Storage & File …
![family](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102850/family-400x200.jpg)
The complex digital life of the modern family: Online safety and privacy concerns
The National Cyber Security Alliance (NCSA) conducted a study to better understand teens and parents’ attitudes, concerns and knowledge base about online safety and …
![mobile payment](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110344/mobile_payment-400x200.jpg)
Can it be true? Most consumers value security more than convenience
52 percent of UK consumers think fraud is an inevitable part of shopping online, according to Paysafe, a global payments provider. What are the top three challenges of …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102855/stop-400x200.jpg)
Business suffers as over-zealous security tools block legitimate work
Most security teams utilise a ‘prohibition approach’ – i.e. restricting user access to websites and applications – a tactic which is hampering productivity and innovation …
![Terminal](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102852/terminal-keys-400x200.jpg)
Most organizations don’t have SSH security policies in place
Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, …
![container](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102858/containers-400x200.jpg)
Enterprise container security: There’s room for improvement
With companies such as Facebook, Netflix and Google heralding the use of containers for their agility, portability, and cost benefits – enterprises are following suit. …
![transformation](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110303/transformation-400x200.jpg)
Digital skills gap: The biggest hindrance to addressing cybersecurity?
Although businesses recognize the importance of digital transformation, organizations worldwide are struggling to balance the elements needed to deliver on digital. Of 1,625 …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
The pervasive risk of vulnerable open source components
Veracode announced findings from the 2017 State of Software Security Report, a comprehensive review of application security testing data from scans conducted by a base of more …
![Businessman juggling](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195417/problems-400x200.jpg)
Should non-security functions get more involved in cybersecurity?
According to a survey conducted by Dimensional Research, 100 percent of respondents believe soft skills are important when hiring for their security teams. The three most …
![transform](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102903/transform-400x200.jpeg)
Digital transformation and the loss of security control
Unpatched web infrastructure and de-centralised web management practices are leaving UK organisations vulnerable to cyber-attacks and high profile data breaches. New RiskIQ …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112722/tunnel-400x200.jpg)
Are you employees snooping on the corporate network?
The overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major snooping problem among today’s workforce. …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111040/open_source-400x200.jpg)
Companies turn a blind eye to open source risk
Though open source software (OSS) helps software suppliers be nimble and build products faster, there are hidden software supply chain risks all software suppliers and IoT …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality