![](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094949/smart-home-2-400x200.jpg)
Identifying vulnerable IoT devices by the companion app they use
For better or worse, connected “smart” devices are springing up like mushrooms. There is no doubt that they can be very helpful but, unfortunately, most have a …
![shadow](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093543/shadow-400x200.jpg)
Identifying evasive threats hiding inside the network
There is no greater security risk to an organization than a threat actor that knows how to operate under the radar. Malicious insiders and external cybercriminals are getting …
![RubyGems](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093545/rubygems-400x200.jpg)
Backdoored Ruby gems stole credentials, injected cryptomining code
The compromise of several older versions of a popular Ruby software package (aka a Ruby “gem”) has led to the discovery of a more widespread effort to inject …
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103910/facebook-icon-400x200.jpg)
New tool enables users to disconnect their off-Facebook activity from their account
Facebook has announced the (partial) roll-out of a long-awaited “Clear History” privacy tool for users, only it ended up being dubbed “Off-Facebook …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093605/zero-400x200.jpg)
Three essential elements of a successful Zero Trust cybersecurity program
Organizations have traditionally deployed cybersecurity approaches that adhered to the phrase made famous by President Ronald Reagan: “Trust, but verify.” This meant that most …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
When will the GDPR pot boil over? It’s sooner (and different) than you think
There’s an old saying that a watched pot never boils. In reality, the sauce in that pot is heating up in a way we can’t quite see yet. After the major compliance ramp by …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094106/qualys-visibility-400x200.jpg)
Securing the cloud: Visibility, compliance and vulnerability management
In this Help Net Security podcast recorded at Black Hat USA 2019, Hari Srinivasan, Director of Product Management for Qualys, talks about the basics of securing your cloud. …
![city night](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111601/city_night-400x200.jpg)
Cybersecurity challenges for smart cities: Key issues and top threats
Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things (IoT) to develop more intelligent, efficient, …
![2019 Cloud Security Report](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093547/2019_Cloud_Security_Report-400x200.jpg)
2019 Cloud Security Report: Latest trends and challenges
Check out the 2019 Cloud Security Report sponsored by (ISC)². Based on a comprehensive survey of cybersecurity professionals in the 400,000+ cybersecurity community on …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093549/vlc1-400x200.jpg)
VLC users urged to implement latest security update
VLC, the popular cross-platform media player, has reached version 3.0.8, which fixes over a dozen security vulnerabilities, some of which could be exploited by attackers to …
![insider](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101239/insider-400x200.jpeg)
With shadow IT running rampant, how can IT keep pace?
Data privacy is high on the minds of businesses and consumers alike, as society at large is getting wise to the potential dangers that even seemingly innocuous apps (ie. …
![CCPA](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093607/CCPA-400x200.jpg)
Automating CCPA compliance: Organize your data and manage requests
Time is running out for California-based businesses to prepare for the California Consumer Privacy Act (CCPA), which goes into effect on January 1, 2020. Despite the Act being …