![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094523/laptop-400x200.jpg)
Board members and the C-suite need secure communication tools
Board members and the C-suite are key targets for cyber-threat actors, due to their access to highly sensitive information. Yet too many of them are putting their …
![Tools](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093739/tools-400x200.jpg)
How tool sprawl is becoming a common issue for SMEs
JumpCloud announced the findings from its Q2 2022 SME IT Trends Report, revealing that while IT teams are successfully managing hybrid-remote work, they are still burdened …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02103956/back-up-data-400x200.jpg)
Data recovery depends on how good your backup strategy is
99% of surveyed IT decision makers state they have backup strategies in place, but just 26% have admitted they were unable to fully restore all data/documents when recovering …
![Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/20170619/cloud-target-400x200.jpg)
Increased security driving investments in cloud computing
Aptum has announced a report which examines the complexities inherent in hybrid cloud environments and their implications on security, data governance, compliance and disaster …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: Microsoft fixes Follina, cybersecurity pros quitting, (IN)SECURE Magazine RSAC 2022
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: (IN)SECURE Magazine: RSAC 2022 special issue released Several of the most …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17130642/ransomware-1600-400x200.jpg)
Which stolen data are ransomware gangs most likely to disclose?
If your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the “encrypt” button, which types of data are more …
![atlassian confluence](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/03160357/atlassian_confluence-400x200.jpg)
Criminal IP analysis report on zero-day vulnerability in Atlassian Confluence
According to Volexity, a webshell was discovered in Atlassian Confluence server during an incident response investigation. Volexity determined that it was a zero-day …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/15145103/infosec_week-1200-17062022-400x200.jpg)
New infosec products of the week: June 17, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Black Kite, Feroot, Incognia, Optiv, and Splunk. Splunk announces platform updates …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092911/money-400x200.jpg)
How financial institutions are improving customer experience with fraud prevention measures
Fraud is a persistent threat, and there’s no end in sight as the e-commerce landscape continues to evolve and the use of online payment platforms increases. According to one …
![programmer](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110033/programmer-400x200.jpeg)
Cyber criminals continue to target and exploit people
Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114037/mobile_devices4-400x200.jpg)
Fraud trends and scam tactics consumers should be aware of
If it seems like you’re receiving more spam than normal, you probably are. Seventy-four percent of consumers say they have received a scam text so far this year, while as many …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
Zero trust adoption: Industry-specific challenges and implementation strategies
Organizations across many industries are in the throes of a journey to implement the zero trust security model to increase their cybersecurity posture. Through my experience …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality