![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
How to make DevSecOps stick with developers
While DevOps culture has brought innovation to the industry and transformed the way software is developed, it’s arguably an outdated concept. The truth is that DevOps has …
![XDR](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17142606/xdr-400x200.jpg)
Three signs your SOC is ready for XDR
Over the past year, there’s been a movement growing in the industry towards Extended Detection and Response, or XDR. While a few offerings represent broad portfolio …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105327/vulnerability-400x200.jpg)
Third-party online assets a growing security risk for retailers
83% of the top U.S. retailers have connections to a vulnerable third-party asset, and 43% have vulnerabilities that pose an immediate cybersecurity risk, Cyberpion reveals. In …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100605/healthcare-400x200.jpg)
How COVID-19 has impacted the security threat landscape
A WatchGuard report reveals how COVID-19 has impacted the security threat landscape, with evidence that attackers continue to target corporate networks despite the shift to …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Remote and cloud-based systems to be ruthlessly targeted next year
Home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021, Trend Micro predicts. Cybercriminals in 2021 will particularly …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: FireEye breach, vulnerable TCP/IP stacks, Kali Linux and the future of pentesting
Here’s an overview of some of last week’s most interesting news and articles: FireEye breach: State-sponsored attackers stole hacking tools U.S. cybersecurity …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100217/biohazard-malware-400x200.jpg)
Ad-injecting malware hijacks Chrome, Edge, Firefox
When searching for things online, has a greater number of ads than usual been popping up at the top of your search results? If it has, and you’re using Microsoft Edge, …
![CPRA](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/12180431/cpra-usa-400x200.jpg)
CPRA hints at the future of cybersecurity and privacy
One of the most notable ballot propositions impacting the privacy and cybersecurity world during the US 2020 election was the passage of the California Privacy Rights Act …
![build](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100100/build-400x200.jpg)
2021 predictions: The rise of cyber resilience
Each year seems to come with more cyber threats, “bad actors,” ransomware and data breaches. The security industry is on fire right now with technology providers continuing to …
![COVID-19](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/07134313/covid-19-mask-400x200.jpg)
40% of COVID-19 contact tracing apps lack basic protections
Guardsquare announced the release of a report which reassesses the levels of security protections and privacy risks of COVID-19 contact tracing apps. The report found that of …
![Joerg Appenzeller computer chip](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08163049/transistors-2d-materiallo-400x200.jpg)
Engineers design transistor that disguises key computer chip hardware from hackers
A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …
![road sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111958/road_sign-400x200.jpg)
Most IT decision makers don’t trust data, but 54% still use it to make decisions
77% of IT decision makers (ITDMs) don’t completely trust the data within their organization for timely and accurate decision making, according to SnapLogic. With 98% of those …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege