![XONA Systems](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/14083805/xona-on_demand_webinar-1000-400x200.jpg)
On-demand webinar: Demystifying zero trust to protect connected assets in OT
Over the past few years, zero trust has become a commonly used phrase for security professionals. While we may understand that a zero-trust framework or architecture should be …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02103956/back-up-data-400x200.jpg)
Veeam fixes critical RCEs in backup solution (CVE-2022-26500, CVE-2022-26501)
Veeam Software has patched two critical vulnerabilities (CVE-2022-26500, CVE-2022-26501) affecting its popular Veeam Backup & Replication solution, which could be …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Financially motivated threat actors willing to go after Russian targets
As Ukrainian organizations are getting hit with yet another data-wiping malware, financially motivated threat actors are choosing sides and some of them are expressing their …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats
We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
The simple secret to app security? Time
The thing about being a security consultant is that people are always looking to you for the “secret” to building a secure digital anything. And by “secret,” they usually mean …
![skull binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113205/skull-api-400x200.jpg)
Malicious web application requests skyrocketing, bad actors stealthier than ever before
Radware released report findings which underscore 2021 as the year of the web application attack. Between 2020 and 2021, the number of malicious web application requests …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093404/money-400x200.jpg)
Top threats for the financial sector
The potential financial, operational, and reputational impact of ransomware makes it the top threat facing financial services organizations, according to a report from …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/10130831/stocksnap_f7aebu9901-400x200.jpg)
Top automotive tech obstacles: Cybersecurity, software quality and functional safety
Molex announced the results of a global survey that examines the pace of innovation accelerating the development of next-generation vehicle architectures and driving …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110124/saas-400x200.jpg)
SaaS revenue declined by 46% in 2021
Software-as-a-service (SaaS) companies saw their revenue growth slow by 46% in 2021 compared to 2020, according to a study by Paddle. The result of qualitative and …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
70% of financial service providers are implementing API security
Financial service providers, such as banks and credit card companies, use a vast amount of APIs, which makes them an attractive target for threat actors. That’s why API …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
Building trust in a zero-trust environment
A recent study by MITRE and DTEX revealed that despite years of industry efforts against insider threats, there isn’t enough data – or systems advanced enough – to spot all …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
How to contain a privileged access breach and make sure it doesn’t happen again
When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality