![work](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103241/work-400x200.jpg)
Key challenges and frustrations of SOC workers
Technology challenges, hiring and staffing issues, processes and pain points, as well as finance and funding difficulties have the potential to limit the ability of SOCs to …
Qualys streamlines supply chain GDPR compliance assessment with cloud app
Qualys announced new functionality in its Security Assessment Questionnaire (SAQ) cloud app that allows customers to better achieve visibility of data across their own network …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100906/infosecurity-europe-18-400x200.jpg)
Photo gallery: Infosecurity Europe 2018 Expo
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Qualys, Barracuda Networks, ECSC Group, Forcepoint, Pen …
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102737/mobile_work-400x200.jpeg)
Most businesses still struggling with mobile working and security
95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and worryingly, 18% suggest their mobile workers don’t care about security, …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Sophisticated keyloggers target the finance industry
Lastline found three separate strains of keylogger malware that are currently targeting finance. Lastline’s analysis of the 100 most recent malware samples found among finance …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Zip Slip vulnerability affects thousands of projects
An arbitrary file overwrite vulnerability that can be exploited by attackers to achieve code execution on a target system affects a myriad of projects and multiple ecosystems, …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
The harsh realities of endpoint management
88 percent of IT professionals acknowledge the importance of endpoint management, yet 30 percent don’t know how many they have. LogMeIn released findings of a new global …
![London](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195027/london-400x200.jpg)
UK businesses overlook external providers when developing cyber strategies
Large businesses in the UK could be falling short when it comes to assessing the cyber resilience of external providers within their supply chain network, according to new …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102855/stop-400x200.jpg)
New security, privacy features in iOS 12 and macOS Mojave
Apple has announced a slew of new features for iOS 12 and macOS Mojave (10.14), but also some security and privacy improvements that should make privacy-minded users very …
![handshake](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101343/handshake-400x200.jpeg)
How security leaders can be empowered to drive results
The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100910/qualys-ai-400x200.jpg)
Discover all IT assets across your global hybrid infrastructure
Qualys announced Asset Inventory (AI), a new cloud app with capabilities that provide customers a single source of truth for IT assets spread across hybrid environments …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100916/lock-blue-400x200.jpg)
Cybersecurity: A core component of digital transformation
In this podcast, Kai Grunwitz, Senior VP EMEA at NTT Security, talks about the NTT Security 2018 Risk:Value Report, and the importance of cybersecurity for a successful …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)