![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110511/firefighters-400x200.jpg)
Week in review: Umasking cybercriminals, improving incident response, macOS Catalina security
Here’s an overview of some of last week’s most interesting news and articles: Winning the security fight: Tips for organizations and CISOs If you ask Matthew …
![Imperva](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093449/imperva-400x200.jpg)
Imperva explains how their recent security incident happened
In late August, Imperva suffered a security incident, resulting in the compromise of sensitive information of some of their Cloud WAF customers. On Thursday, Imperva CTO Kunal …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
DevSecOps role expansion has changed how companies address their security posture
While organizations shift their applications to microservices environments, the responsibility for securing these environments shifts as well, Radware reveals. The rapid …
![FileCloud Smart DLP](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093007/products-1-400x200.jpg)
New infosec products of the week: October 11, 2019
FireEye Digital Threat Monitoring: Visibility beyond your walls FireEye Digital Threat Monitoring automatically collects and analyzes content on the dark and open web, …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
11 steps organizations should take to improve their incident response strategy
As the year draws to a close, it is time for businesses across all industries and sectors to reflect and prepare for the upcoming new year. With this in mind, FIRST has …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095434/industrial-400x200.jpg)
ICS cybersecurity investment should be a priority in protecting operations from disruption
93% of ICS security professionals are concerned about cyberattacks causing operational shutdown or customer-impacting downtime, according to a Tripwire survey. In an effort to …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095522/chip-400x200.jpg)
New method validates the integrity of computer chips using x-rays
Guaranteeing that computer chips, that can consist of billions of interconnected transistors, are manufactured without defects is a challenge. But how to determine if a chip …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094122/5G-2-400x200.jpg)
5G is here, now what?
5G is being positioned as a “network of networks” that will encompass public and private components, licensed and unlicensed spectrum, and even expand beyond cellular, to …
![Microsoft NTLM](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094141/microsoft-ntlm2-400x200.jpg)
Microsoft NTLM vulnerabilities could lead to full domain compromise
Preempt researchers have discovered two vulnerabilities that may allow attackers to bypass a number of protections and mitigations against NTLM relay attacks and, in some …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
2FA, HTTPS and private browsing still a mystery to most Americans
Most US adults know what phishing scams are and where they occur, what browser cookies do, and that advertising is the largest source of revenue for most social media …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092935/iterm2-400x200.jpg)
Critical command execution vulnerability in iTerm2 patched, upgrade ASAP!
A critical vulnerability (CVE-2019-9535) in iTerm2, a macOS terminal emulator frequently used by developers and system administrators, could allow attackers to take control of …
![PKI](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092952/pki-400x200.jpg)
Build or buy: What to consider when deploying on-premise or cloud-based PKI
Public Key Infrastructure (PKI), once considered an IT table stake, has transformed from a tool used to protect websites to a core digital identity management function within …