![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101807/aws2-400x200.jpg)
New security feature to prevent Amazon S3 bucket misconfiguration and data leaks
Hardly a week goes by that we don’t hear about an organization leaving sensitive data exposed on the Internet because they failed to properly configure their Amazon S3 …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Helping researchers with IoT firmware vulnerability discovery
John Toterhi, a security researcher with IoT security company Finite State, believes that many of the security problems plaguing IoT devices are solvable problems through …
![Specops Password Policy](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095719/specops-password-policy-400x200.jpg)
Review: Specops Password Policy
All who work in the information security industry agree that passwords are one of the worst security nightmares of the modern information security age. Having weak passwords …
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095708/mobile_work-400x200.jpg)
Remote working may boost productivity, but also leave you vulnerable to attack
New flexible working practices could pose a security risk to small businesses, with one in five of employees (21%) stating they are most productive when working in public …
![EMV](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095710/emv_chip-400x200.jpg)
In a post-EMV world, fraud is shifting from in-person to ecommerce channels
Three years after the switch to new chip-based credit and debit cards, a study by the National Retail Federation and Forrester says payment card fraud is still a top concern …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095713/tunnel-400x200.jpg)
Worldwide digital transformation spending to reach $1.97 trillion in 2022
Worldwide spending on the technologies and services that enable the digital transformation (DX) of business practices, products, and organizations is forecast to reach $1.97 …
![path](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105453/path-400x200.jpg)
Week in review: Vaporworms, DevOps roadmap for security, ethical data management
Here’s an overview of some of last week’s most interesting news and articles: Cybersecurity and ethical data management: Getting it right Laura Norén, director of …
![Cequence Manager](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095715/cequence-manager-400x200.jpg)
New infosec products of the week: November 16, 2018
Cequence Security announces application security platform to stop bot attacks Cequence ASP is an application security platform that provides a scalable defense against the …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100217/biohazard-malware-400x200.jpg)
Vaporworms: New breed of self-propagating fileless malware to emerge in 2019
WatchGuard Technologies’ information security predictions for 2019 include the emergence of vaporworms, a new breed of fileless malware with wormlike properties to …
![gift](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102501/gift-biohazard-400x200.jpg)
Online shoppers continue to engage in risky behavior
Findings from a new McAfee survey reveal the risky habits of online shoppers, including using unsecured Wi-Fi for online shopping and purchasing items from online retailers …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
What senior finance executives think about payments security
A WEX survey of more than 1,000 CFOs and senior financial executives from the U.S., Europe and Asia/Oceana revealed that for this group, security is paramount in payments …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103200/cloud-400x200.jpg)
Cloud interoperability and app mobility outrank cost and security for primary hybrid cloud benefits
Enterprises plan to increase hybrid cloud usage, with 91% stating hybrid cloud as the ideal IT model, but only 18% stating they have that model today, according to Nutanix. …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations