Please turn on your JavaScript for this page to function normally.
criminal
How attackers abuse Quickbooks to send phone scam emails

INKY researchers disclosed the latest variant of the tried-and-true phone scam, a low-tech phone scam where attackers extract personal information by sending out spoofed …

fist
Best practices for cyber resilience

Cyber resilience is a top priority for global organizations. Understanding threats plays a key role in building and maintaining a strong layered security approach, according …

hybrid work
Employees frustrated by the lack of suitable tech in a hybrid work environment

Ivanti worked with global digital transformation experts and surveyed 10,000 office workers, IT professionals, and the C-Suite to evaluate the level of prioritization and …

organize
How to develop successful incident response plans

In this Help Net Security video, Neal Bridges, CISO at Query.AI, talks about the rules organizations need to think about if they way to develop successful incident response …

vulnerability
A look at the bring your own browser (BYOB) approach

Recently, Microsoft retired IE 11 in favor of Microsoft Edge, which claims to be more secure than Google Chrome, with built-in defenses against phishing and malware. Does this …

Internet
The impact of DNS attacks on global organizations

Often we see stories about cyber attacks that breached an organisations’ security parameters, and advice on how we can protect against future threats. However, what is often …

zero trust
7 steps to switch your organization to a zero trust architecture

In recent years, zero trust security has gained incredible attention from the government, cybersecurity leaders and regulators. Many organisations are still fuzzy on what zero …

PCI
PCI DSS 4.0 changes help organizations protect payment card data

The PCI Security Standards Council (PCI SSC) published version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS is a global standard that provides a baseline of …

road sign
Why 80% of companies are looking to switch their managed service provider

As companies’ valuations tumble, so is their wrangling of the cloud. Even the experts are having a tough time with it – so much so that an overwhelming majority of …

biometrics
Simplifying legal entity identification in the digital age

As the world’s legal entities rush to digitize their processes and transactions, confidence in digital authenticity is in short supply. Thankfully, a single, open and …

Apple Lockdown Mode
Apple previews Lockdown Mode to protect users from targeted spyware

In this Help Net Security video, you’ll learn more about Lockdown Mode, a security capability from Apple that offers specialized additional protection to users who may …

application
Positive trends in the application security space

ShiftLeft recently released their 2022 AppSec Progress Report, which evaluated how the changes and advancements in static application security testing (SAST) and intelligent …

Don't miss

Cybersecurity news