Please turn on your JavaScript for this page to function normally.
cloud
How to implement least privilege in the cloud

According to a recent survey of 241 industry experts conducted by the Cloud Security Alliance (CSA), misconfiguration of cloud resources is a leading cause of data breaches. …

healthcare
New third-party healthcare data rules: Increased access alongside privacy considerations

It would be an understatement to say that 2020 is a monumental year for healthcare. The COVID-19 pandemic brought many aspects of care to the forefront – from technology and …

industry
Advanced attack scenarios and sabotage of smart manufacturing environments

Advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments, according to Trend Micro. Industry 4.0 Lab, the system that …

Business ideas
Cybersecurity and compliance: Vital priorities for MSPs and their clients

Cybersecurity and, to a lesser but growing extent, compliance are the most pressing priorities for MSPs and their customers this year, according to a Kaseya survey of 1,300 …

mobile device
Global remote work transitions fail to consider security gaps

Security measures and password best practices have not taken priority in many regions during the shift to remote work due to the COVID-19 pandemic, according to a survey by …

patch
May 2020 Patch Tuesday: Microsoft fixes 111 flaws, Adobe 36

For the May 2020 Patch Tuesday, Microsoft has fixed 111 CVE-numbered flaws and Adobe 36, but none are under active attack. Microsoft’s updates For the third time in the …

person
Why a single online name and social cards will be the new norm

Each day, online users provide companies, organizations, and other individuals with vital personal information without much thought. As social networks and brands began to use …

ISC2 report
(ISC)2 Professional Development Institute: Timely and continuing education opportunities

In this Help Net Security podcast, Mirtha Collin, Director of Education for (ISC)², talks about the Professional Development Institute (PDI), a valuable resource for …

Work
Is remote work here to stay?

There’s no doubt COVID-19 set the remote work revolution on a fast track. And on that fast track, VPN usage soared to new heights with no signs of it slowing down. Companies …

gap
Total number of publicly reported breaches in Q1 2020 down 58% compared to last year

The total number of publicly reported breaches in Q1 2020 has decreased by 58% compared to the same period last year, Risk Based Security reveals. Publicly reported breaches …

password
Home workplaces introduce new risks, poor password hygiene

Entrust Datacard released the findings of its survey, which highlights the critical need to address data security challenges for employees working from home as a result of the …

Utilizing Big Data course
Gain free access to Utilizing Big Data course, a $200 value

With in-person education events and conferences cancelled or postponed indefinitely, online courses are becoming the new normal for earning CPEs. (ISC)² has an online library …

Don't miss

Cybersecurity news