![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105628/IoT-400x200.jpg)
The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors
There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017 – from 15 percent to 26 percent – and the …
![library](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094731/library-400x200.jpg)
Whose (usage) data is it, anyway?
Around the world, business customers now demand business-to-business (B2B) SaaS companies safeguard their usage data. More importantly, they want to know how SaaS companies …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
How institutions, advisors, and investors think about digital assets
Institutional investors are finding appeal in digital assets and many are looking to invest more in digital assets over the next five years, according to new research from …
![Cynet platform](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095647/cynet-platform-400x200.jpg)
Cynet Free IR tool offering empowers responders to know and act against active attacks
The saying that there are two types of organizations, those that have gotten breached and those who have but just don’t know it yet, has never been more relevant, making sound …
![WordPress](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105154/wordpress-400x200.jpg)
WordPress updates are digitally signed at last!
WordPress 5.2 is out and brings a number of functional improvements, but the great news for those who are worried about the security of their installation is the …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102007/cisco-400x200.jpg)
Critical flaw allows attackers to take over Cisco Elastic Services Controllers
Cisco has patched a critical, remotely exploitable authentication bypass vulnerability in Cisco Elastic Services Controller (ESC), a popular enterprise software for managing …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094406/cloud1-400x200.jpg)
Executing a multi-cloud strategy: Crawl, walk, run
Despite many challenges, enterprises are increasingly adopting cloud computing in an effort to become more agile, lower IT costs, and have the ability to scale. Most of those …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100605/healthcare-400x200.jpg)
Is curiosity killing patient privacy?
The digitization of healthcare is changing the face of fraud. With the growth of electronic health records (EHRs), online patient portals and virtual clinics, a wealth of …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113044/vault-1-400x200.jpg)
Open banking establishes new access to banks’ networks, creating additional security issues
As more markets adopt open banking — which mandates banks to open their systems to third parties — it will be increasingly critical for banks to ensure the security of not …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094905/5g-400x200.jpg)
Mobile carriers believe security and reliability concerns will increase with 5G
Mobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they …
![maze](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094410/maze-400x200.jpg)
Senior payment executives’ thoughts on SME PCI compliance and security
Acquirers now hold higher expectations for compliance than they did 12 months ago, Sysnet Global Solutions has established. What is your current compliance rate? The annual …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094348/ms_exchange-400x200.jpg)
Researchers discover highly stealthy Microsoft Exchange backdoor
An extremely stealthy Microsoft Exchange backdoor can read, modify or block emails going through the compromised mail server and even compose and send new emails. LightNeuron …
Featured news
Resources
Don't miss
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)