![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105149/idea-400x200.jpg)
CISOs: Change your mindset or lose your job
Capgemini commissioned IDC to produce a new piece of research, which reveals the increasing pressure on the Chief Information Security Officer to drive forward digital …
![Deloitte report](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095319/deloitte-report-400x200.jpeg)
Evaluating the biggest cyber threats to the electric power sector
The network of power plants and lines connecting to homes and businesses is widely considered to be among the most critical infrastructure in the world. It’s also one of …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095839/email-400x200.jpg)
Email authentication use growing steadily in every industry sector
U.S. federal government agencies and many major enterprises have made significant strides to thwart the spread of fake emails, a major cybersecurity attack vector. But many …
![RSA Conference](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095311/41482056922_0d9e0dca2c_k-400x200.jpg)
RSA Conference 2019 USA: What you can expect at this year’s event
It’s that time of year: RSA Conference 2019 USA is a little over a month away. To prepare, we asked Britta Glade, Director of Content and Curation for RSA Conference, to tell …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111503/abstract-arrows-400x200.jpg)
Week in review: FaceTime bug, Apple developer certs abused, new privacy attack against 5G
Here’s an overview of some of last week’s most interesting news and articles: New Mac malware steals cookies, cryptocurrency and computing power A new piece of Mac …
![Magento](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100304/magento-400x200.jpg)
Most Magento shops get compromised via vulnerable extensions
Vulnerable third party extensions (modules) are now the main source of Magento hacks, says security researcher and Magento forensics investigator Willem de Groot. “The …
![Phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112408/phone-red-400x200.jpg)
Researchers reveal new privacy attack against 3G, 4G, and 5G mobile users
5G cellular mobile communications, when implemented, are expected to provide high bandwidth, low latency, energy savings, better connectivity, but security and privacy must …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
Safeguarding your data from human error and phishing attacks with the cloud
This is the third article of a series, the first article is available here, and the second one is here. In a world of ransomware attacks, companies should prepare for the …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Is your organization ready for the data explosion?
“Data is the new oil” and its quantity is growing at an exponential rate, with IDC forecasting a 50-fold increase from 2010 to 2020. In fact, by 2020, it’s estimated that new …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104620/email-400x200.jpg)
Employees report 23,000 phishing incidents annually, costing $4.3 million to investigate
Account takeover-based (ATO) attacks now comprise 20 percent of advanced email attacks, according to Agari’s Q1 2019 Email Fraud & Identity Deception Trends report. …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Companies getting serious about AI and analytics, 58% are evaluating data science platforms
New O’Reilly research found that 58 percent of today’s companies are either building or evaluating data science platforms – which are essential for companies that are …
![Mac malware](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095317/mac-malware2-400x200.jpg)
New Mac malware steals cookies, cryptocurrency and computing power
A new piece of Mac malware is looking to steal both the targets’ computing power and their cryptocurrency stash, Palo Alto Networks researchers warn. About the …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations