Please turn on your JavaScript for this page to function normally.
Apple
Apple fixed some interesting bugs in iOS and macOS

In addition to announcing a number of new products and subscription services, Apple has released security updates for iOS, macOS, Safari, tvOS, iTunes, iCloud, and Xcode. The …

organize
How to build an effective vulnerability management program

The concept of vulnerability management has undergone a number of changes in the last few years. It is no longer simply a synonym for vulnerability assessment, but has grown …

keys
Cybercriminals are increasingly using encryption to conceal and launch attacks

In this Help Net Security podcast, Deepen Desai, VP Security Research & Operations at Zscaler, talks about the latest Zscaler Cloud Security Insight Report, which focuses …

face
Guilty by association: The reality of online retail third-party data leaks

Online retail activity continues to accelerate at a rampant pace and shows no signs of slowing down. According to the National Retail Federation (NRF), U.S. retail sales are …

cloud
Less than 20% of IT pros have complete access to critical data in public clouds

Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient. Lack of visibility can result in a …

certificate
Most companies help employees cover costs to obtain professional certifications

Workers today can expand their professional skills with less financial stress thanks to a majority of employers offering to cover or offset educational costs, new research …

finance
CFOs and CIOs must collaborate on digital transformation to remain competitive

CFOs are shifting their priorities from cutting costs to rapidly investing in technology and data. Significant percentages of senior financial executives currently implement …

laptop
Attackers compromised ASUS to deliver backdoored software updates

Unknown attackers have compromised an update server belonging to Taiwanese computer and electronics maker ASUS and used it to push a malicious backdoor on a huge number of …

Tripwire DevOps
Secure workloads without slowing down your DevOps flows

In this Help Net Security podcast recorded at RSA Conference 2019, David Meltzer, CTO at Tripwire, and Lamar Bailey, Senior Director of Security Research at Tripwire, discuss …

face
Employee cybersecurity essentials part 1: Passwords and phishing

Your company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn’t mean you’re not at risk for a breach, or that – as an …

dark
What worries you the most when responding to a cybersecurity incident?

The clock starts ticking immediately following a cybersecurity incident with the first 24 hours vital in terms of incident response. The majority (59 percent) of companies are …

mobile apps
Consumers willing to dump apps that collect private data, but can’t tell which are doing so

Consumers are increasingly leery of third parties using and capitalizing on their private data. Two in three consumers are willing to dump data-collecting apps if the …

Don't miss

Cybersecurity news