![endpoint protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/23100505/endpoint-protection-400x200.jpg)
67% of IT pros concerned with teleworking endpoint misuse
43.13% of workers will stay remote after the pandemic ends and two out of three IT professionals are concerned with teleworking endpoint misuse, a new Prey study reveals. The …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094155/keyboard2-400x200.jpg)
IT security teams deal with unique challenges fueled by a remote workforce
IT security teams faced unprecedented challenges last year fueled by dramatically expanded work-from-home (WFH) programs, increased BYOD policy adoptions, and rising internal …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/02103824/5g-3d-400x200.jpg)
Technologies, markets and apps transitioning to the 5G communications era
ResearchAndMarkets released a report that addresses several current technologies (as well as their markets, applications, and other characteristics) that, according to the ITU …
![SonicWall](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/21143110/sonicwall-storm-400x200.jpg)
Hackers found leveraging three SonicWall zero-day vulnerabilities
Attackers that seem to have “intimate knowledge” of the SonicWall Email Security product have been discovered leveraging three (at the time) zero-day …
![red](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/01132207/red-stairs-400x200.jpg)
Attackers are exploiting zero-day in Pulse Secure VPNs to breach orgs (CVE-2021-22893)
Attackers have been exploiting several old and one zero-day vulnerability (CVE-2021-22893) affecting Pulse Connect Secure (PCS) VPN devices to breach a variety of defense, …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
How do I select an identity management solution for my business?
According to a recent survey, the pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and …
![car](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/19160749/car-shadow-400x200.jpg)
Securing vehicles from potential cybersecurity threats
Organizations in the automotive industry are no stranger to demands and mandates regarding car and passenger safety, so addressing the issue of cybersecurity of computerized, …
![Cybersecurity risk management](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092752/cybersecurity_risk_management-400x200.jpg)
Cybersecurity only the tip of the iceberg for third-party risk management
Most companies are missing key risks at more than one stage of the vendor risk lifecycle, yet few are expanding their TPRM programs to address these risks, according to …
![HNS QR code](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/15165347/hns-qrcode-400x200.jpg)
Most users don’t know the capabilities and risks of QR codes
QR code usage continues to rise in popularity. In fact, 57% of respondents to a new Ivanti study claim to have noticed an increase in the usage of QR codes since mid-March …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094406/cloud1-400x200.jpg)
Complexity and budgetary constraints complicate cloud security
While spending on cloud services is high, with more than half of respondents having spent more than $10 million and 11% having spent more than $100 million in the last three …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
Most enterprise leaders concerned about digital transformation ROI
Digital.ai released a report detailing the findings of a survey of over 600 enterprise IT, security, and business decision makers on the state of digital transformation in …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093811/facebook1-400x200.jpg)
Facebook Messenger users targeted by a large-scale scam
A large-scale scam campaign targeting Facebook Messenger users all over the world has been detected by Group-IB. Digital Risk Protection (DRP) analysts have found evidence …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about