Please turn on your JavaScript for this page to function normally.
encryption
Researchers design a way to make encrypted keys harder to crack

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits …

hand
When exploit code precedes a patch, attackers gain a massive head start

Cybersecurity researchers that publicize exploit code used in cyberattacks are giving a clear and unequivocal advantage to attackers, new research conducted by Kenna Security …

data
Data growth as the number one storage management challenge

Datadobi released a report by 451 Research which reveals the major impact that data growth is having on storage management, highlighting the rise in retention of unstructured …

Sophos XDR
Sophos XDR: Threat hunting through the entire security ecosystem

Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading …

Acronis Cyber Protect
Product Showcase: Acronis Cyber Protect

Considering the breadth and diversity of attacks facing today’s organizations, it’s no wonder cybersercurity and IT professionals are relying on an ever expanding arsenal of …

containers
3 areas of implicitly trusted infrastructure that can lead to supply chain compromises

The SolarWinds compromise in December 2020 and the ensuing investigation into their build services put a spotlight on supply chain attacks. This has generated a renewed …

Top security threats for power plants and how to proactively avoid them

Power plants are one of the most vitally important components of modern civilization’s infrastructure. A disruption in energy production impacts all aspects of society from …

DevSecOps
Infrastructure drift: A multidimensional problem with the need for new DevSecOps tools

As modern infrastructures get more complex everyday, DevOps teams have a hard time tracking infrastructure drift. The multiplicity of factors involved when running …

Microsoft 365
Organizations using Microsoft 365 experience more breaches, with more severe impacts

85% of organizations using Microsoft 365 have suffered email data breaches in the last 12 months, an Egress report reveals. The increased amount of remote work as a result of …

mobile user
Consumers aware of travel cyber risks, still not putting their digital wellness first

68% of Americans plan to travel for leisure this summer, with 12% doing so internationally, a McAfee survey reveals. While 68% of U.S. consumers report that they are connected …

cloud complexity
Cloud compromise now the biggest cybersecurity issue for financial institutions

Infoblox unveils a research into how the COVID-19 shutdowns challenged the financial services industry’s core infrastructure. More than one year into the pandemic, …

Zix
Phishers using Zix to “legitimize” emails in the eyes of Office 365 users

UPDATE: May 19, 2021 – 03:10 AM ET Mirko Zorz, Editor in Chief, Help Net Security The page you are on used to contain a news item based on research from Abnormal …

Don't miss

Cybersecurity news