![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110009/industry-400x200.jpg)
A look at cybersecurity for rail systems, building automation and the future of critical infrastructure
Waterfall Security Solutions announced a major expansion into new markets and industry verticals. In support of this expansion, Waterfall has secured a significant new funding …
![NIST](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/17142818/nist-logo-x-400x200.jpg)
NIST Privacy Framework 1.0: Manage privacy risk, demonstrate compliance
Our data-driven society has a tricky balancing act to perform: building innovative products and services that use personal data while still protecting people’s privacy. To …
![collaboration](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094807/collaboration-1-400x200.jpg)
Business units and IT teams can no longer function in silos
Over the next two years, 50% of organizations will experience increased collaboration between their business and IT teams, according to Gartner. The dispute between business …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
Week in review: Windows crypto flaw, API security risks, exploits for Citrix security hole abound
Here’s an overview of some of last week’s most interesting news and articles: Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking A …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Microsoft Application Inspector: Check open source components for unwanted features
Want to know what’s in an open source software component before you use it? Microsoft Application Inspector will tell you what it does and spots potentially unwanted …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
IoT cybersecurity’s worst kept secret
By improving access to data and taking advantage of them in fundamentally different ways to drive profitability, IT security executives are rapidly changing perceptions of …
![Masergy Shadow IT Discovery](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/14195712/masergy_demo-400x200.jpg)
New infosec products of the week: January 17, 2020
Masergy Shadow IT Discovery: Automatically identify unauthorized SaaS applications Masergy Shadow IT Discovery immediately scans and identifies all applications, providing …
![analysis](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101116/analysis-400x200.jpg)
How to govern cybersecurity risk at the board level
Rapidly evolving cybersecurity threats are now commanding the attention of senior business leaders and boards of directors and are no longer only the concern of IT security …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101644/money-400x200.jpg)
Worldwide IT spending to total $3.9 trillion in 2020
Worldwide IT spending is projected to total $3.9 trillion in 2020, an increase of 3.4% from 2019, according to the latest forecast by Gartner. Global IT spending is expected …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102441/facebook-400x200.jpg)
Facebook users will be notified when their credentials are used for third-party app logins
Facebook will (finally!) explicitly tell users who use Facebook Login to log into third-party apps what information those apps are harvesting from their FB account. At the …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110326/puzzle-400x200.jpg)
Embedding security, the right way
As organizations proceed to move their processes from the physical world into the digital, their risk profile changes, too – and this is not a time to take risks. By not …
![Danger](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102357/money-danger-400x200.jpg)
Emotet remains the dark market leader for delivery-as-a-service
The vast majority of nationally sponsored cybersecurity incidents take the form of espionage through data exfiltration, with frequent employment of remote access tool Plug-X, …
Featured news
Sponsored
Don't miss
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation