![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100329/puzzle-400x200.jpeg)
Incorporating sensitive asset data into your vulnerability and compliance program
In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the importance of incorporating …
![connected house](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104916/connected-house-400x200.jpg)
IoT failures plague most users worldwide
52% of consumers worldwide are now using Internet of Things (IoT) devices, yet 64% of those have already encountered performance issues – according to Dynatrace. On average, …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101407/user-400x200.jpg)
Listening-Watch: Strong, low-effort, wearable 2FA scheme
Passwords are still the preferred online authentication method because they are easy to use, but they are increasingly not enough to keep our accounts secure. To mitigate the …
![Apache Struts](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104837/apache-struts-400x200.jpg)
PoC exploit for critical Apache Struts flaw found online
The Apache Software Foundation revealed last week the existence of a critical Apache Struts flaw (CVE-2018-11776) similar to the one exploited in the Equifax breach and urged …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194921/industry-400x200.jpg)
Emerging consensus for an ICS security approach
An increasing body of experience with industrial control system (ICS) security, as well as the emerging Industrial Internet of Things (IIoT) are driving a new consensus as to …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102703/privacy-400x200.jpg)
Privacy Shield: Should I stay or should I go?
The lead up to the GDPR enforcement date consumed a large swath of media coverage. This essentially buried the news that in early July 2018, the European Union Parliament …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102329/usb-400x200.jpg)
23% of UK SMBs still use USB drives as their primary data storage solution
Mny British companies are finding it hard to store and manage their company’s data effectively. Seagate polled a representative sample of 1,006 UK SMB employees, asking them …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
Blocking compromised passwords: How and why to do it
Passwords are beginning to feel like the zombie that just won’t die. Even after Bill Gates famously called for their demise in 2004, this antiquated form of user verification …
![red](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101022/red-400x200.jpg)
Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing
Here’s an overview of some of last week’s most interesting news and articles: The importance of career pathing in the cybersecurity industry A major issue facing …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105905/magnify-400x200.jpg)
Google removes 39 YouTube channels linked to Iranian influence operations
Google has identified and removed 39 YouTube channels, six blogs on Blogger and thirteen Google+ accounts linked to IRIB, the Islamic Republic of Iran Broadcasting, which were …
![DefenseCode Web Security Scanner](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100337/defensecode-wss-400x200.png)
New infosec products of the week: August 24, 2018
DefenseCode announces free edition of their Web Security Scanner DefenseCode Web Security Scanner is a DAST (Dynamic Application Security Testing) product for testing security …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
Why do enterprises take a long time to install vital security updates
More than a quarter (27%) of enterprise IT departments in the US are forced to wait at least a month before installing vital security updates, due to budgetary restraints and …
Featured news
Resources
Don't miss
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition
- How to detect and disable Apple AirTags that might be tracking you