![infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094225/infosec_products-400x200.jpg)
New infosec products of the week: June 18, 2021
deepwatch MOBILE gives cybersecurity experts real-time visibility into their SOC deepwatch MOBILE provides customers real-time insight into their Security Operations Center …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095405/cloud-400x200.jpg)
Can on-prem security experts make the move to the cloud?
As cloud computing grows in popularity across all use cases, cloud workloads have never been more attractive to malicious actors. A recent McAfee report points to a 630 …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094545/stop-400x200.jpg)
73% of enterprises suffer security and compliance issues due to internal misalignment
According to Enterprise Management Associates (EMA) and BlueCat’s recently published research report, nearly 3 in 4 enterprises (73%) have suffered security or compliance …
![application](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27101818/application-blue-400x200.jpg)
The challenges of technical debt and how it impacts organizations
69% of IT leaders identify technical debt as a major threat to their companies’ ability to innovate, according to an OutSystems report. With COVID-19 exposing vulnerabilities …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Malicious COVID-19 online content bypassing moderation efforts of social media platforms
Malicious COVID-19 online content – including racist content, disinformation and misinformation – thrives and spreads online by bypassing the moderation efforts of …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102838/cloud-400x200.jpg)
Cloud security posture confidence is high, yet most IT pros have experienced a cloud-related breach
OpsCompass announced the results of a report it conducted on cloud security posture and management challenges. The report is based on survey responses from 253 full-time, …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Software delivery maturity generating business benefits
Organizations with a high level of software delivery maturity are three times more likely to grow at 15 percent or more annually, according to Forrester Consulting. …
![Windows Defender](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095902/windows_defender2-400x200.jpg)
Microsoft Defender for Endpoint now detects jailbroken iOS devices
Microsoft has announced new and improved capabilities for enterprise security teams that use Microsoft Defender for Endpoint on Android and iOS and Microsoft threat and …
![CVS Health](https://img.helpnetsecurity.com/wp-content/uploads/2021/06/17120513/cvs-health-hns-400x200.jpg)
Unprotected CVS database exposed sensitive customer searches
Researchers have discovered an unprotected, exposed online database with over a billion records belonging to American healthcare company CVS Health. The discovery, made by …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
Preventing security issues from destroying the promise of IoT
Internet of Things (IoT) devices fall into various categories. Some, such as those located in a hospital setting, are very sophisticated, with advanced operating systems and …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/18183052/numbers-box-400x200.jpg)
Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27090527/ransomware-yellow-400x200.jpg)
What is the real cost of ransomware?
Cybereason released research findings from a global ransomware study of nearly 1,300 security professionals that reveals more than half of organizations have been the victim …