![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
Serverless, shadow APIs and Denial of Wallet attacks
In this Help Net Security podcast, Doug Dooley, Chief Operating Officer at Data Theorem, discusses serverless computing, a new area that both DevOps leaders and enterprise …
![XebiaLabs DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094735/xebialabs-devops-400x200.jpg)
New infosec products of the week: March 29, 2019
Guardicore launches freely available public resource for investigating malicious IP addresses and domains Guardicore Threat Intelligence is a freely available public resource …
![CyberArk report](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094738/cyberark-report-400x200.jpg)
Enterprises fear disruption to business critical applications, yet don’t prioritize securing them
The majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on – such as ERP and CRM systems – any …
![jackal](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100237/jackal-400x200.jpg)
Lessons learned from the many crypto hacks
The one poignant lesson that crypto investors globally have learned over the years is that despite the immutable, impenetrable nature of the technology behind cryptocurrencies …
![Power](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094744/power-400x200.jpg)
CIOs admit certificate-related outages routinely impact critical business applications and services
Certificate-related outages harm the reliability and availability of vital network systems and services while also being extremely difficult to diagnose and remediate. …
![Capgemini research](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094746/capgemini-automotive-ai-400x200.jpg)
Status of AI implementation at automotive organizations
Just 10 percent of major automotive companies are implementing artificial intelligence (AI) projects at scale, with many falling short of an opportunity that could increase …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105152/cisco-400x200.jpg)
Cisco botched patches for its RV320/RV325 routers
Cisco RV320 and RV325 WAN VPN routers are still vulnerable to attack through two flaws that Cisco had supposedly patched. #Cisco Small Business Routers still vulnerable to …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
When it comes to file sharing, the cloud has very few downsides
Organizations storing data and documents they work on in the cloud is a regular occurrence these days. The cloud offers scalability in terms of storage and cloud services …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104753/iot-1-400x200.jpg)
Security remains a top concern for IoT executives, but small fixes can shore up ecosystem resilience
66 percent of companies say their c-suite executives are supportive of their IoT implementation, but even with strong support they noted there are hurdles to overcome. A …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095522/chip-400x200.jpg)
Algorithms can now find bugs in computer chips before they are made
In early 2018, cybersecurity researchers discovered two security flaws they said were present in almost every high-end processor made and used by major companies. UPEC product …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105446/risk-400x200.jpg)
Third-party cyber risk management is a burden on human and financial resources
Organizations and third parties see their third-party cyber risk management (TPCRM) practices as important but ineffective. There are four major takeaways for key decision …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100425/business-400x200.jpeg)
SMBs willing to invest more to protect their businesses
Cybersecurity demands of SMBs have become both a major risk and revenue opportunity to managed service providers (MSPs). MSPs are at risk of losing their SMB clients if they …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations