![dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103342/dark-1-400x200.jpeg)
Trust nothing: A life in infosec is a life of suspicion
Like many before him, Amit Serper started his cybersecurity career in one of Israel’s intelligence agencies. Nine years later, he left for the private sector: he joined …
![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
An intelligence-driven approach to cyber threats
In the age of big data, it is easy to think that only machines can detect a signal amid the noise. While it’s true that big data tools can discover signals that might not be …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
How privileged insiders threaten the security of global organizations
A new global survey from BeyondTrust explores the visibility, control, and management that IT organizations in the U.S., APAC, Europe and the Middle East have over employees, …
![payments](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100545/payments-400x200.jpeg)
Will biometrics replace passwords for online payment authentication?
Over half of consumers in the UK (53 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud, …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101128/people-400x200.jpeg)
How much do you know about your invisible workforce?
The way work gets done is changing. To tap into specialized talent, organizations increasingly rely on the external workforce, which includes contingent workers such as …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
Advancing transparency and accountability in the cybersecurity industry
NSS Labs, the Texas-based company that specializes in testing the world’s security products, has a new CEO. Jason Brvenik, the company’s CTO since early 2017, took over …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Embrace chaos to improve cloud infrastructure resilience
Netflix is a champion of using chaos engineering to improve the resilience of its cloud infrastructure. That’s how it ensures its customers don’t have their Stranger Things …
![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111014/firefighters-400x200.jpg)
2018 in numbers: Data breaches cost $654 billion, expose 2.8 billion data records in the U.S.
Cybercriminals exposed 2.8 billion consumer data records in 2018, costing over $654 billion to U.S. organizations, according to ForgeRock. Cyberattacks to U.S. financial …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094909/criminal2-400x200.jpg)
Despite disclosure laws, cybercrime may be widely underreported
While attack vectors remain largely the same year over year, attack volume will increase and cybercrime may be vastly underreported, according to the 2019 State of …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Unclassified data creates security blind spots for most companies
Global businesses continue to house ‘dark data’ within their organizations, creating a honeypot for cybercriminals, finds research from Veritas Technologies. The …
![Sign in with Apple](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094207/sign-in-with-apple-400x200.jpg)
Apple debuts privacy-minded “Sign in with Apple” SSO
Among the many news shared during Apple’s annual developer conference there’s one that stands out: the introduction of “Sign in with Apple”. About the …
![Quest Diagnostics](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094209/quest_diagnostics-400x200.jpg)
Nearly 12 million Quest Diagnostics patients affected by data breach
Quest Diagnostics, a US-based company that offers medical testing services, has announced that a third-party billing collections company they use has been hit by a data …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes