![vulnerability assessment tools](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/29174027/vulnerability_assessment_tools-400x200.jpg)
5 open-source vulnerability assessment tools to try out
A vulnerability assessment is a methodical examination of network infrastructure, computer systems, and software with the goal of identifying and addressing known security …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
1 in 3 organizations don’t know if their public cloud data was exfiltrated
Laminar released findings from its 2022 Security Professional Insight Survey conducted at AWS re:Inforce in July 2022 and Black Hat in August 2022. The research revealed gaps …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/27174916/ransomware-hands-400x200.jpg)
Ransomware gangs’ favorite targets
Barracuda released its fourth-annual threat research report which looks at ransomware attack patterns that occurred between August 2021 and July 2022. A closer look at …
![ciso compensation](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/30141040/ciso-compensation-400x200.jpg)
US-based CISOs get nearly $1 million per year
The role of the Chief Information Security Officer (CISO) is a relatively new senior-level executive position within most organizations, and is still evolving. To find out how …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/05112959/password-code-400x200.jpg)
Can your passwords withstand threat actors’ dirty tricks?
Password security hinges on the answer to that seemingly simple question. Unfortunately, you can’t know the answer until you’ve engaged a ruthless penetration tester to find …
![Stellar Cyber Open XDR](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/25093026/stellar_cyber-open-xdr-home-400x200.jpg)
Product showcase: The Stellar Cyber Open XDR platform
As enterprises find themselves dealing with ever-increasing threats and the boundaries of their organization disappearing, security teams are more challenged than ever to …
![hardware](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093705/hardware1-400x200.jpg)
How automation can solve application development challenges
Security Compass has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111221/tools-400x200.jpg)
Outdated infrastructure not up to today’s ransomware challenges
A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage …
![Bitbucket](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/29125036/bitbucket-1600x1200px-04-400x200.jpg)
Patch critical flaw in Atlassian Bitbucket Server and Data Center! (CVE-2022-36804)
A critical vulnerability (CVE-2022-36804) in Atlassian Bitbucket Server and Data Center could be exploited by unauthorized attackers to execute malicious code on vulnerable …
![coronavirus](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/05133610/coronavirus-cybercrime-400x200.jpg)
COVID-19 data put for sale on the Dark Web
Resecurity, a California-based cybersecurity company protecting Fortune 500, has identified leaked PII stolen from Thailand’s Department of Medical Sciences containing …
![NetworkManager](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/29100943/networkmanager-400x200.jpg)
NetworkManager 1.40 released, features 600 patches
NetworkManager attempts to keep an active network connection available at all times. The point of NetworkManager is to make networking configuration and setup as painless and …
![Data](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/07091136/data_1-400x200.jpg)
Data security hinges on clear policies and automated enforcement
In 2003, California became the first U.S. state to require and implement a series of data breach notification laws designed to protect against the misuse of residents’ …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality