![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093759/arrow-400x200.jpg)
CISOs: Make 2020 the year you focus on third-party cyber risk
While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Over half of organizations were successfully phished in 2019
Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
More authentication and identity tech needed with fraud expected to increase
The proliferation of real-time payments platforms, including person-to-person (P2P) transfers and mobile payment platforms across Asia Pacific, has increased fraud losses for …
![Citrix](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/23145946/citrix-logo-red2-400x200.jpg)
IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781
Citrix and FireEye have teamed up to provide sysadmins with an IoC scanner that shows whether a Citrix ADC, Gateway or SD-WAN WANOP appliance has been compromised via …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093009/cisco-400x200.jpg)
It’s time to patch your Cisco security solutions again
Cisco has released another batch of security updates and patches for a variety of its offerings, including many of its security solutions. Security fixes for security …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100823/user-400x200.jpg)
Cybercriminals using fake job listings to steal money, info from applicants
Be extra careful when looking for a job online, the Internet Crime Complaint Center (IC3) warns: cybercriminals are using fake job listings to trick applicants into sharing …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093605/zero-400x200.jpg)
Zero Trust: Beyond access controls
As the Zero Trust approach to cybersecurity gains traction in the enterprise world, many people have come to recognize the term without fully understanding its meaning. One …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
There is no easy fix to AI privacy problems
Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
CIOs using AI to bridge gap between IT resources and cloud complexity
There’s a widening gap between IT resources and the demands of managing the increasing scale and complexity of enterprise cloud ecosystems, a Dynatrace survey of 800 …
![Apple privacy](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092722/apple-privacy-400x200.jpg)
Did Apple drop end-to-end encrypted iCloud backups because of the FBI?
Two years ago, Apple abandoned its plan to encrypt iPhone backups in the iCloud in such a way that makes it impossible for it (or law enforcement) to decrypt the contents, a …
![Honeywell](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/22114743/honeywell-logo-red-400x200.jpg)
Honeywell Maxpro VMS/NVR systems vulnerable to hijacking
Honeywell’s Maxpro VMS and NVR, network video recorders and video management systems deployed in commercial, manufacturing and energy facilities around the world, sport …
![container](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102319/container-400x200.jpg)
Container security requires continuous security in new DevSecOps models
When Jordan Liggitt at Google posted details of a serious Kubernetes vulnerability in November 2018, it was a wake-up call for security teams ignoring the risks that came with …
Featured news
Sponsored
Don't miss
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation