![PCI](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/08101515/pci-compliance-400x200.jpg)
PCI SSC releases PCI Secure Software Lifecycle (SLC) Standard 1.1
The PCI Security Standards Council (PCI SSC) has published version 1.1 of the PCI Secure Software Lifecycle (SLC) Standard and its supporting program documentation. The PCI …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Database encryption: Protecting the crown jewels
Databases are the lifeblood store of information for every organization. Without them, the organization’s efficiency, productivity and scope to prosper would be curtailed …
![network monitoring](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/18093404/network_monitoring_world-400x200.jpg)
How do I select a network monitoring solution for my business?
A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will …
![Mask](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/27144910/face-mask-black-400x200.jpg)
10 COVID-19-related lessons for future-ready cybersecurity
In 2020, we experienced wave after wave of COVID-19 surges and watched failure after failure at practicing what we knew were effective preventative measures. Similarly, in …
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093217/DevOps-400x200.jpg)
Exploring DevOps adoption among database pros
Redgate has released a report which shows some dramatic changes in IT as a direct result of the current pandemic. Nearly three quarters of organizations have now adopted …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101705/cloud-400x200.jpg)
The state of multicloud adoption, its drivers, and the technologies enabling it
Turbonomic announced findings from the survey of over 800 global IT professionals that examines the current state of multicloud adoption, its drivers, and the technologies …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Criminals leveraging shift to remote work to develop targeted attacks
Malwarebytes announced the findings of its report which explores how the global pandemic forced many employees to quickly become a remote workforce and confined consumers to …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094612/week_in_review1-400x200.jpg)
Week in review: Most used MITRE ATT&CK tactics, boosting the “Sec” in DevSecOps
Here’s an overview of some of last week’s most interesting news and articles: Nearly 40% of consumers lost money to phone scams in 2020 Businesses and consumers …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/19160906/apple-lock-400x200.jpg)
Apple details major security, privacy enhancements in its devices
Security and privacy are a big selling point for Apple. The company has released on Thursday a newer version of its Platform Security Guide, outlining the security and privacy …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/19130114/microsoft-hand-400x200.jpg)
Microsoft: Solorigate attackers grabbed Azure, Intune, Exchange component source code
Microsoft has completed its internal investigation about the Solorigate (SolarWinds) security incident, and has discovered that the attackers were very interested in the code …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093232/shield1-400x200.jpg)
What behavioral experts can teach us about improving security
The “castle and moat” approach to protecting one’s domain was effective for centuries. At the start of the internet age, when a company’s greatest assets were physically …
![WAF](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094312/WAF-400x200.jpg)
Most security pros think a WAF is high maintenance
An organization’s web application firewall (WAF) is a critical line of defense in protecting proprietary and customer data, but the concern is that some organizations are …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about