![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094214/qualys-400x200.jpg)
Qualys at Infosecurity Europe 2019: Hear best practices from industry leaders
There will be no lack of interesting content from Qualys at Infosecurity Europe 2019 this year. Depending on you interests, you might want to make time for some of these talks …
![Field-programmable gate arrays](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094223/research-400x200.jpg)
Scientists uncover vulnerability in FPGAs, affecting cloud services and IoT
Field-programmable gate arrays (FPGAs) are, so to say, a computer manufacturer’s “Lego bricks”: electronic components that can be employed in a more flexible …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110903/car-green2-400x200.jpg)
How likely are weaponized cars?
It is easy to become absorbed by the exaggerated Hollywood depictions of car hacking scenarios – to imagine a not-so-distant future when cars or their supporting …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
Why zero trust is crucial to compliance
The enterprise faces a brand new world when it comes to data privacy and security. New regulations like the General Data Protection Regulation (GDPR) and the California …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094431/open-400x200.png)
Growing reliance on open source libraries leaves many companies vulnerable
Organizations are becoming increasingly dependent on open source libraries (OSLs) to develop code for software and websites. However, Jing Xie, senior threat intelligence …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094408/cloud2-400x200.jpg)
Cloud migration journey is more complex than anticipated for innovation and efficiency
Two-thirds of large enterprises are not realizing the full benefits of their cloud migration journeys identifying security and the complexity of business and operational …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103550/people-400x200.jpg)
Week in review: BlueKeep, GitHub automated security fixes, reducing the threat of legacy apps
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Attackers are exploiting WordPress plugin flaw to inject malicious scripts …
![Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105142/chrome-400x200.jpg)
Chrome extension devs must drop deceptive installation tactics
After announcing its intention to limit third-party developers’ access to Chrome’s webRequest API, which is used by many ad-blocking extensions to filter out …
![Siemens LOGO!](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094229/siemens-logo-400x200.jpg)
Siemens LOGO!, a PLC for small automation projects, open to attack
LOGO!, a programmable logic controller (PLC) manufactured by Siemens, sports three vulnerabilities that could allow remote attackers to reconfigure the device, access project …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112007/biohazard-2-400x200.jpg)
Researchers fight ransomware attacks by leveraging properties of flash-based storage
Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of …
![SailPoint Predictive Identity platform](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094239/SPI-modeling-400x200.png)
New infosec products of the week: May 31, 2019
SailPoint Predictive Identity platform: The future of identity governance SailPoint unveiled the SailPoint Predictive Identity platform, the intelligent cloud identity …
![colors](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100157/colors-400x200.jpg)
What mechanisms can help address today’s biggest cybersecurity challenges?
In this Help Net Security podcast, Syed Abdur Rahman, Director of Products with unified risk management provider Brinqa, talks about their risk centric knowledge-driven …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!