
Cybersecurity salary, skills, and stress survey
This survey has ended. Exabeam is conducting an annual survey to understand skills, compensation trends and workplace trends among SOC and security analysts. All participants …

Cisco warns about public exploit code for critical flaws in its 220 Series smart switches
Cisco has fixed over 30 vulnerabilities in various solutions, including Cisco UCS Director, Cisco UCS Director Express for Big Data, Cisco IMC Supervisor, and the Cisco 220 …

Unlocking the future of blockchain innovation with privacy-preserving technologies
The origins of blockchain as many are familiar with it today can be traced back to the Bitcoin whitepaper, first published in 2008 by Satoshi Nakamoto, which offered a vision …

From SmarterChild to Siri: Why AI is the competitive advantage securing businesses
The dream of an AI-influenced world is finally here. After decades of writing about it, AI has reached a point where it’s ingrained into our daily lives. From the days of …

Identifying vulnerable IoT devices by the companion app they use
For better or worse, connected “smart” devices are springing up like mushrooms. There is no doubt that they can be very helpful but, unfortunately, most have a …

Identifying evasive threats hiding inside the network
There is no greater security risk to an organization than a threat actor that knows how to operate under the radar. Malicious insiders and external cybercriminals are getting …

Backdoored Ruby gems stole credentials, injected cryptomining code
The compromise of several older versions of a popular Ruby software package (aka a Ruby “gem”) has led to the discovery of a more widespread effort to inject …

New tool enables users to disconnect their off-Facebook activity from their account
Facebook has announced the (partial) roll-out of a long-awaited “Clear History” privacy tool for users, only it ended up being dubbed “Off-Facebook …

Three essential elements of a successful Zero Trust cybersecurity program
Organizations have traditionally deployed cybersecurity approaches that adhered to the phrase made famous by President Ronald Reagan: “Trust, but verify.” This meant that most …

When will the GDPR pot boil over? It’s sooner (and different) than you think
There’s an old saying that a watched pot never boils. In reality, the sauce in that pot is heating up in a way we can’t quite see yet. After the major compliance ramp by …

Securing the cloud: Visibility, compliance and vulnerability management
In this Help Net Security podcast recorded at Black Hat USA 2019, Hari Srinivasan, Director of Product Management for Qualys, talks about the basics of securing your cloud. …

Cybersecurity challenges for smart cities: Key issues and top threats
Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things (IoT) to develop more intelligent, efficient, …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption