Please turn on your JavaScript for this page to function normally.
Malicious crypto miners can make a profit in a few hours

A Trend Micro research revealed a constant battle for resources among malicious cryptocurrency mining groups. Unlike traditional cybercriminal business models, just a few …

backup
People’s habits around personal and corporate data backup procedures

In this video for Help Net Security, Jon Fielding, Managing Director at Apricorn, talks about a survey of thousands of Twitter users, around their personal and corporate data …

Keeper Compliance Reports
Keeper Compliance Reports

In this video, Craig Lurey, CTO and Co-Founder of Keeper Security, talks about the new secure add-on to the Keeper enterprise platform, called Compliance Reports. Keeper …

Identity fraud losses totaled $52 billion in 2021

A Javelin study reveals that traditional identity fraud losses totaled $52 billion and affected 42 million U.S. adults. Among the trends observed were huge increases to …

49% of small medical practices lack a cyberattack response plan

A Software Advice survey revealed how cyberattacks can negatively impact healthcare providers by threatening core functions and patient privacy. According to findings, 22% of …

code
What you need to look out for when installing packages from public repositories

In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, talks about the risks posed by malicious open source packages. Malicious packages can harm …

82% of public sector software apps have security flaws

Veracode analyzed data from 20 million scans across half a million applications, which revealed that the public sector has the highest proportion of security flaws in its …

data
The challenges of consumer data and PII usage

In this Help Net Security video, Nong Li, CEO at Okera, talks about the challenges of using and managing consumer data and personally identifiable information (PII). As …

Organizations need to up their cloud native security strategy

Organizations still have a long way to go to understand, plan and deploy their cloud native security strategies, an Aqua Security study reveals. Many cloud native applications …

Most companies don’t have a mature CLM program in place

It’s been more than a year since the SolarWinds attack occurred, but still many organizations are unable to secure and govern the volume of machine and application …

Cyber resiliency is top proactive priority for organizations

In the face of increasing cyberattacks and cyber warfare, organizations are moving toward strengthening their cyber resiliency. An OpenText report provides predictions on what …

backup
The current state of enterprise backup and recovery

In this video for Help Net Security, Anthony Cusimano, Solutions Evangelist at Veritas, talks about the current state of enterprise backup and recovery. In the wake of the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools