Webinar: Defending account takeovers at Remitly
Account Takeover attacks don’t follow conventional attack patterns – they look, act, and feel like legitimate users. Without the right tooling, visibility into …
IT security incidents affecting German critical infrastructure are on the rise
The number of IT security incidents reported by critical infrastructure companies in Germany has soared. In 2017, the German Federal Office for Security in Information …
How RSA Conference 2019 brings diverse security professionals together
With RSA Conference 2019 USA just two weeks away, we asked Sandra Toms, Vice President and Curator, RSA Conference, to tell us more about the challenges involved in developing …
Building security into cloud native apps with NGINX
Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and …
Indicators of poor password hygiene exposed
The recovered compromised credentials and personally identifiable information (PII) as well as the identified trends in online security habits and the data criminals tend to …
74% of organizations face outages due to expired certificates
As information security budgets grow and funds are allocated to protect the defensive perimeter, many companies have overlooked the critical importance of digital certificate …
The importance of consumer trust in the second-hand mobile market
58 percent of global consumers have yet to trade in an old mobile device, though almost two-thirds (64%) globally reported they would be willing to do so if more stringent …
2018 saw 6,515 reported breaches, exposing 5 billion sensitive records
There were 6,515 publicly disclosed data compromise events through December 31, 2018, exposing over 5 billion sensitive records, according to Risk Based Security’s Year …
Week in review: RunC, Snapd flaws, Zero Trust browsing, 5 years of NIST Cybersecurity Framework
Here’s an overview of some of last week’s most interesting news and articles: Machine learning fundamentals: What cybersecurity professionals need to know In this …
Three reasons employee monitoring software is making a comeback
Companies are increasingly implementing employee and user activity monitoring software to: Ensure data privacy Protect intellectual property and sensitive data from falling …
Machine learning fundamentals: What cybersecurity professionals need to know
In this Help Net Security podcast, Chris Morales, Head of Security Analytics at Vectra, talks about machine learning fundamentals, and illustrates what cybersecurity …
Azure AD Identity Protection now revolves around risky users and risky sign-ins
Launched in September 2018, Microsoft Threat Protection (MTP) integrates a number of Microsoft services to provide a fully integrated, end-to-end solution for securing the …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations