![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092933/insider_threat-1-400x200.jpg)
How businesses use data might not be popular with the public
A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101457/biohazard-400x200.jpg)
Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk
Cato Networks announced the results of its analysis of 263 billion enterprise network flows between April and June 2021. Researchers showed a novel use of Houdini malware to …
![remote work](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02105451/remote_work-400x200.jpg)
Remote working positively impacting employee experience
Globalization Partners announced the findings of its survey which focused on the sentiment of people working on global teams. 63 percent of respondents say their companies …
![Fortinet](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/17153716/fortinet-logo-hns2-400x200.jpg)
Unpatched Fortinet FortiWeb vulnerability allows remote OS command injection
An unpatched vulnerability in the management interface for FortiWeb, Fortinet’s web application firewall, could allow a remote, authenticated attacker to execute …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/17125509/chip-iot-400x200.jpg)
Critical bug allows remote compromise, control of millions of IoT devices (CVE-2021-28372)
A vulnerability (CVE-2021-28372) in the SDK that allows IoT devices to use ThroughTek’s Kalay P2P cloud platform could be exploited to remotely compromise and control …
![T-Mobile](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/17100255/t-mobile-magenta-400x200.jpg)
T-Mobile data breach: Industry reactions
T-Mobile is investigating a claim that as many as 100 million accounts may have been compromised in a data breach. In a cybersecurity update, T-Mobile said: “We have …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094016/drown-400x200.jpg)
How building a world class SOC can alleviate security team burnout
For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …
![Melissa Sutherland](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/11091608/melissa_sutherland_2-booz_allen_hamilton-400x200.jpg)
Where do we stand when it comes to multi-cloud maturity?
Most IT leaders agree their future-state IT landscape will be a multi-cloud environment. Figuring out how to achieve that will take some time. In this interview with Help Net …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27090527/ransomware-yellow-400x200.jpg)
Most organizations experienced at least one ransomware attack, multiple attacks very common
One third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell …
![NAS](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/12163630/nas_devices-400x200.jpg)
NAS devices under attack: How to keep them safe?
Network-attached storage (NAS) devices are a helpful solution for storing, managing, and sharing files and backups and, as such, they are an attractive target for cyber …
![SASE](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/02084438/sase-400x200.jpg)
SASE market size to reach $11.29 billion by 2028
The global secure access service edge (SASE) market size is expected to reach $11.29 billion by 2028, registering a CAGR of 36.4%, a ResearchAndMarkets report reveals. The …
![fraud detection](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/14134048/fraud_detection-400x200.jpg)
Digital fraud attempts on the rise: Gaming, travel and leisure most targeted
As the prevalence of digital fraud attempts on businesses and consumers continues to rise, TransUnion’s analysis found that fraudsters are re-focusing their efforts from …
Featured news
Sponsored
Don't miss
- The changes in the cyber threat landscape in the last 12 months
- The CISO’s approach to AI: Balancing transformation with trust
- 10 fintech companies to watch in 2024
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data