![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104902/architecture-400x200.jpg)
Adoption rates of basic cloud security tools and practices still far too low
As organizations migrate more of their data and operations to the cloud, they must maintain a robust cybersecurity posture, a Bitglass report reveals. Each year, Bitglass …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Certificate-related outages impact the reputation of financial services organizations
Financial services organizations are more likely to have digital certificate-related outages than other industries, a Venafi study reveals. Over 100 CIOs in the financial …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111725/brain-400x200.jpg)
Federal and SLED IT managers say AI will be a game changer
AI is not a concept of the future, a MeriTalk study confirms. A new study, underwritten by Arrow and NetApp, surveyed 300 Federal, state, local, and higher education (SLED) IT …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113257/server-400x200.jpg)
Flaw in Iomega, LenovoEMC NAS devices exposes millions of files on the Internet
A vulnerability in legacy Iomega and LenovoEMC network-attached storage (NAS) devices has led to many terabytes of potentially sensitive data being accessible to anyone via …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Over 80% of network teams play a role in security efforts
More than 4 in 5 IT teams are involved in security efforts, and a majority of them report an increase of at least 25 percent in time spent on these efforts over the past 12 …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093932/lock-400x200.jpg)
The importance of hardening firmware security
It’s no secret that attackers traditionally go after low-hanging fruit when hacking a system. Historically, this has meant targeting user applications, and, for deeper …
![shadow IT](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093940/shadow-it-400x200.png)
Enterprises catching up with the explosion of cloud use and shadow IT in the workplace
Businesses worldwide are gaining control of previously unmonitored and unsupported cloud applications and devices, known as shadow IT, that lurk in their IT environments, …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093937/email-400x200.jpg)
Companies still don’t understand the importance of DMARC adoption
By implementing DMARC, brands lower the odds of their domains being spoofed and used for phishing attacks on recipients. Still, 79.7% of all domains analyzed have no DMARC …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100814/server-400x200.jpg)
As cyber attacks increase, the cloud-based database security market grows
The cloud-based database security market is expected to register a CAGR of 19.5% over the forecast period 2019-2024, according to ResearchAndMarkets. With the increasing …
![satellite](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094351/satellite-400x200.jpg)
New satellite constellations aim to improve IoT connectivity options
By 2024, there will be 24 million IoT connections made via satellite, ABI Research reveals. A new report unveils the long-term opportunity within the satellite space for the …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
Researcher releases PoC code for critical Atlassian Crowd RCE flaw
A researcher has released proof-of-concept code for a critical code execution vulnerability (CVE-2019-11580) in Atlassian Crowd, a centralized identity management solution …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094026/eye-400x200.jpg)
Avoiding a biometric dystopia
In part one of our two-part series, we explored how biometric authentication methods are being defeated. In the second part, we’ll explore how manipulating biometrics can …
Featured news
Resources
Don't miss
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play