![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094523/laptop-400x200.jpg)
Does working remotely actually work?
In the blink of an eye, remote work went from an experiment to a requirement. And as the results of a recent survey conducted by OnePoll reveal, work has a completely new look …
![Cyber-Risk Oversight 2020](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/18162536/cyber-risk_oversight_2020-handbook-400x200.jpg)
Handbook: Cyber-Risk Oversight 2020
The Internet Security Alliance (ISA) and the European Confederation of Directors’ Associations (ecoDa) released Cyber-Risk Oversight 2020, a handbook on cyber-risk management …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093347/towards-cloud-400x200.jpg)
Week in review: Cloud migration and cybersecurity, data trending on the dark web, Zoom security
Here’s an overview of some of last week’s most interesting news and articles: What type of data is trending on the dark web? Fraud guides accounted for nearly half …
![RubyGems](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093545/rubygems-400x200.jpg)
760+ malicious packages found typosquatting on RubyGems
Researchers have discovered over 760 malicious Ruby packages (aka “gems”) typosquatting on RubyGems, the Ruby community’s gem repository / hosting service. The …
![Corsa Security Orchestrator](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/16123408/product-400x200.png)
New infosec products of the week: April 17, 2020
NeuVector adds to container security platform, automates end-to-end vulnerability management The platform additions include the new Vulnerability and Compliance Explorer for …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093643/printer-danger-400x200.jpg)
Office printers: The ticking IT time bomb hiding in plain sight
Office printers don’t have to be security threats: with foresight and maintenance they’re very easily threat-proofed. The problem is that system administrators rarely give the …
![click](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093327/click-400x200.jpg)
Surge in remote working reveals concerns around unprotected endpoints
Millions of US businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks. New research from Tanium …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102125/identity2-400x200.jpeg)
What type of data is trending on the dark web?
Fraud guides accounted for nearly half (49%) of the data being sold on the dark web, followed by personal data at 15.6%, according to Terbium Labs. Researchers surveyed three …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093503/network-400x200.jpg)
Researchers develop self-healing and self-concealing PUF for hardware security
A team of researchers from the National University of Singapore (NUS) has developed a novel technique that allows Physically Unclonable Functions (PUFs) to produce more …
![Cisco IP Phone](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/16120846/cisco_ip_phone-400x200.jpg)
Using Cisco IP phones? Fix these critical vulnerabilities
Cisco has released another batch of fixes for a number of its products. Among the vulnerabilities fixed are critical flaws affecting a variety of Cisco IP phones and Cisco UCS …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
On my mind: Transitioning to third-party cloud services
During this extended period of social distancing filled with increased online activity, I can’t help but reflect on all the user data that has been created, stored, hacked, …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101159/arrows-400x200.jpg)
Information security goes non-binary
Finding security holes in information systems is as old as the first commercially available computer. Back when a “computer” was something that sat in a computer room, users …