SIEM complexity and cloud visibility put companies at risk
Nearly half of companies are unable to remediate insider threats until after data loss has occurred, a Gurucul survey reveals. The study found that lack of visibility into …
Global internet freedom declines for the ninth consecutive year
Governments around the world are increasingly using social media to manipulate elections and monitor their citizens, tilting the technology toward digital authoritarianism. As …
Only 47% of cybersecurity pros are prepared to deal with attacks on their IoT devices
Fewer than half (47%) of cybersecurity professionals have a plan in place to deal with attacks on their IoT devices and equipment, despite that fact that nine out of ten …
What financial records do companies need to keep, and for how long?
Companies generate stacks of documents and managing them correctly is crucial. It can be complicated to balance organizational requirements, employee interests, and legal …
Mobile security firms will help protect Google Play
Google has partnered with mobile security companies ESET, Lookout and Zimperium to identify potentially harmful and unwanted apps before they are listed on Google Play. …
Apple details new Safari, Location Services, Sign in with Apple privacy features
Apple has updated its privacy pages on Wednesday and shared three new white papers and tech briefs on how Safari, Location Services, and Sign in with Apple protect user …
5 factors to consider when choosing an encryption key management system
Data breaches are at an all-time high with 2019 looking to one of the worst on record for data loses. Within the data security battle, encryption is considered to be the gold …
The promise and peril of post quantum computing
In this Help Net Security podcast, Avesta Hojjati, Head of R&D at DigiCert, talks about the security implications of post quantum computing. Here’s a transcript of the …
Cybercriminals are testing exposed credentials for future account takeover attacks
Fraud increased 30% overall in Q3 2019 and bot-driven account registration fraud is up 70% as cybercriminals test stolen credentials in advance of the holiday retail season, …
Phishing attacks at highest level in three years
The number of phishing attacks continued to rise into the autumn of 2019, according to APWG. The total number of phishing sites detected in July through September 2019 was …
Security and risk compliance: Still the most important part of IT strategy
Security practice is the number one priority for IT teams, with a clear majority (59%) reporting deficiencies in the controls, that should ensure data processing and storage …
Detecting and tracking phishing campaigns through web analytics identifiers
Cyber crooks are quick to abuse legitimate services for their own malicious purposes. One of the latest instances demonstrating this propensity involves phishing kit …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul