![search](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/16143539/search-look-400x200.jpg)
Users turn to independent search engines for privacy, but also get misinformation
Anti-vaccine websites, which could play a key role in promoting public hesitancy about a potential COVID-19 vaccine, are far more likely to be found via independent search …
![CEO](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112240/ceo-400x200.jpg)
Internal audit leaders should develop new skills to stay relevant
Chief audit executives (CAEs) and internal audit leaders report their next-generation competency levels in three vital areas – governance, methodology and enabling technology …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102608/healthcare-400x200.jpg)
Healthcare breaches declined sharply during the first half of 2020
This has been a very challenging year. Despite the COVID-19 outbreak starting in the first half of 2020, data analyzed from the Health and Human Services (HHS) Office for …
![US Army](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094136/us_army2-400x200.jpg)
Army researchers awarded patent for secure comms
Army researchers have been awarded a patent for inventing a practical method for Army wireless devices to covertly authenticate and communicate. Photo by Jason Edwards …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094631/hit-400x200.jpg)
Week in review: vBulletin 0-day, open source projects under attack, critical security updates galore
Here’s an overview of some of last week’s most interesting news and articles: Intel, SAP, and Citrix release critical security updates August 2020 Patch Tuesday …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
State-backed hacking, cyber deterrence, and the need for international norms
As time passes, state-backed hacking is becoming an increasingly bigger problem, with the attackers stealing money, information, credit card data, intellectual property, state …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
New infosec products of the week: August 14, 2020
Ericom Application Isolator separates corporate apps from unauthorized users to prevent ransomware Ericom Software announced the introduction of Ericom Application Isolator, a …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
In reality, how important is zero trust?
Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103351/businessman-400x200.jpg)
CIOs prioritizing IAM over endpoint security and security awareness training
CIOs are prioritizing identity and access management (IAM) over endpoint security and security awareness training in 2020, according to a Hitachi ID survey. The survey, …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094523/laptop-400x200.jpg)
What is the impact of the pandemic on managed services providers?
A new SolarWinds study revealed the operational impact of the current pandemic on managed services providers (MSPs) and future growth opportunities in the market. The study …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101705/cloud-400x200.jpg)
Most security pros are concerned about human error exposing cloud data
A number of organizations face shortcomings in monitoring and securing their cloud environments, according to a Tripwire survey of 310 security professionals. 76% of security …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Surge in cyber attacks targeting open source software projects
There has been a massive 430% surge in next generation cyber attacks aimed at actively infiltrating open source software supply chains, Sonatype has found. Rise of next-gen …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege