![work](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095753/work-400x200.jpg)
(ISC)² to aid cybersecurity professional development in emerging economies
(ISC)² has signed a Memorandum of Understanding (MOU) with the Korea Internet & Security Agency (KISA) to strenghten cybersecurity professional development in emerging …
![Chris Konrad](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/19151243/chris_konrad-2-wwt-400x200.jpg)
Want to be a CISO? Being technical is just one of the requirements
As data breaches’ financial and reputational costs continue to reach new heights, cybersecurity should be on top of mind for leadership across every industry. Recent …
![ImmuniWeb Discovery](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/18170038/immuniweb_discovery-400x200.jpg)
Product showcase: ImmuniWeb Discovery – attack surface management with dark web monitoring
Organizations around the globe struggle to identify their IT assets hosted in a multicloud environment, on premise or managed by numerous third parties. The lack of visibility …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17130642/ransomware-1600-400x200.jpg)
Ransomware preparedness: What are you doing wrong?
Axio released its 2022 State of Ransomware Preparedness research report, revealing that although notable improvements have been made since Axio’s 2021 report, organizational …
![Apache](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/19150814/apache-1600-400x200.jpg)
Apache Commons Text flaw is not a repeat of Log4Shell (CVE-2022-42889)
A freshly fixed vulnerability (CVE-2022-42889) in the Apache Commons Text library has been getting attention from security researchers these last few days, worrying it could …
![iDealwine](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/19094335/idealwine-1280-400x200.jpg)
iDealwine suffers a data breach
Popular international fine wine online retailer iDealwine has suffered a data breach during the past weekend, and has yet to reveal the number of customers affected. Its …
![Tails](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/19082014/tails-os-400x200.jpg)
Secure portable operating system Tails 5.5 released
Tails, based on Debian GNU/Linux, is a portable operating system that protects against surveillance and censorship, and version 5.5 is now available for download. When …
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
Upgrade your security awareness efforts: Here’s how to start
October is Security Awareness Month, an exciting time as organizations around the world train people how to be cyber secure, both at work and at home. But what exactly is …
![passwordless](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/29093808/passwordless_hns1-400x200.jpg)
The future of MFA is passwordless
Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more …
![cybersecurity investments](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/21142945/cybersec_investments-400x200.jpg)
CISOs, rejoice! Security spending is increasing
Three factors influencing growth in security spending are the increase in remote and hybrid work, the transition from virtual private networks (VPNs) to zero trust network …
![car](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105029/cars-many-400x200.jpg)
Police breaks up criminal ring that hacked keyless systems to steal cars
A car theft ring that used fraudulent software to “hack” and steal vehicles with remote keyless entry and ignition systems has been dismantled by the French …
![Scribe Security](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/12090631/scribe_security-400x200.jpg)
Product showcase: Scribe platform’s end-to-end software supply chain security
As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams are more challenged than ever to build transparent trust in the software …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality