Please turn on your JavaScript for this page to function normally.
SAP
SAP S/4HANA adoption rebounds as enterprises look to minimize business disruption

U.S. adoption of SAP S/4HANA has rebounded after slowing for most of 2020 as the COVID-19 pandemic stalled digital transformations, according to a report published by …

magnify
Vulnerable TCP/IP stack is used by almost 200 device vendors

Researchers have discovered 14 new vulnerabilities affecting the proprietary NicheStack (aka InterNiche) TCP/IP stack, used in OT devices such as the extremely popular Siemens …

Office 365
A clever phishing campaign is targeting Office 365 users

Microsoft is warning about an ongoing, “sneakier than usual” phishing campaign aimed at Office 365 users. An active phishing campaign is using a crafty combination …

CISSP Flash Cards
Are you ready for the CISSP exam?

Find out with the Official (ISC)² CISSP Flash Cards. Study for the CISSP exam anytime, anywhere using this FREE interactive self-study tool that tests knowledge across all …

Group-IB Digital Risk Protection
Review: Group-IB Digital Risk Protection

The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and …

AWS
AWS S3 can be a security risk for your business

Along with the shift to the cloud and emergence of modern digital services and applications, new security concerns have emerged for organizations. More connectivity means more …

cloud binary
Collaboration is key for cloud innovation

Developers and security professionals work in very different ways. While the former is likely to move and innovate fast – with quick coding and rapid application building a …

DataSecOps
What is DataSecOps and why it matters

In this Help Net Security podcast, Ben Herzberg, Chief Scientist at Satori, explains what DataSecOps is, and illustrates its significance. Here’s a transcript of the podcast …

ENISA
Supply chain attacks expected to multiply by 4 in 2021

Supply chain attacks have been a concern for cybersecurity experts for many years because the chain reaction triggered by one attack on a single supplier can compromise a …

DevOps
73% of healthcare organizations have now adopted DevOps

The last year was challenging for every business sector, and none more than healthcare which was under enormous pressure to provide care while changing the way many services …

gap
Moving toward a reality where breaches are not a given

Ninety-one percent of cybersecurity leaders say they want to see their organization shift from ‘assume breach’ to breach prevention in the next three years, according to a …

5G
5G services roaming subscribers to reach 210 million in 2026

The global number of roaming subscribers using 5G services will increase from 4.5 million in 2021 to 210 million in 2026, according to Juniper Research. As the international …

Don't miss

Cybersecurity news