![sharing](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101707/sharing-400x200.jpg)
Digital transformation: Visibility compliance in a transitional world
In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses digital transformation challenges, and illustrates what an organization has to do …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Worldwide cloud IT infrastructure revenues continue to grow
Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 45.5% year over year in the …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194930/abstract3-400x200.jpg)
Week in review: Threat modeling, blockchain and security, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Cisco plugs critical flaws in many switches, security appliances Cisco has released …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101802/office365-400x200.jpg)
Office 365 users targeted by phishers employing simple HTML tricks
Phishers are using a simple but effective trick to fool Microsoft’s NLP-based anti-phishing protections and Office 365 users into entering their login credentials into …
![ExtraHop Reveal(x)](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100733/extrahop-revealx-400x200.png)
New infosec products of the week: June 22, 2018
ExtraHop Reveal(x) sheds light on the darkspace ExtraHop announced Reveal(x) Summer 2018. The latest release includes new capabilities designed to modernize enterprise …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Banking Trojans and cryptojacking on the rise
A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well as from in-depth …
![Red door](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195306/door_red-400x200.jpg)
Unrestricted access to systems and files exposes organizations to cybercrime
UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101404/cisco-400x200.jpg)
Cisco plugs critical flaws in many switches, security appliances
Cisco has released security updates to address a bucketload of vulnerabilities affecting multiple products, including 24 critical and high-severity flaws found in many of its …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
Could an Equifax-sized data breach happen again?
Many global financial services organizations are targeted by sophisticated cyberattackers in an attempt to steal critical data and personally-identifiable information (PII), …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
Endpoint security automation a top priority for IT pros
A new SANS Institute report found that automating endpoint detection and response processes is the top priority for IT professionals trying to put actionable controls around …
![trend](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100743/trend-400x200.jpeg)
Major trends in app development, agile/DevOps maturity, and low-code adoption
Digital transformation dominates business strategy today, which is why web and mobile development demand is booming. Moreover, speed and agility are more important than ever …
![future](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105715/future-400x200.jpg)
Disruptive technologies in fintech to watch
Juniper Research has revealed the top 10 technologies set to disrupt the fintech industry in 2018 and 2019. New research found a wealth of positive changes stemming from …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)