Cohesity expands collaboration with Cisco and HPE to improve data security for enterprises

Cohesity announced Cisco and HPE will each be offering Cohesity Cloud Services (CCS) to bring efficient data security and management to companies operating in today’s modern hybrid and multicloud... Read more »

Cybersecurity measures SMBs should implement

Small and medium-sized businesses (SMBs) are targeted by cyberattackers as much as large companies, the 2023 Verizon Data Breach Investigations Report (DBIR) has revealed; here are some cybersecurity controls... Read more »

U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity

The Biden-Harris Administration has announced a cybersecurity certification and labeling program to help Americans more easily choose smart devices that are safer and less vulnerable to cyberattacks. The new... Read more »

CompTIA DataSys+ program provides resources for database management skills

CompTIA released the CompTIA DataSys+ program, a comprehensive set of resources for learning and skills validation for IT professionals in search of database management skills. The CompTIA DataSys+ program... Read more »

Citrix NetScaler zero-day exploited in the wild, patch is available (CVE-2023-3519)

Citrix has patched three vulnerabilities (CVE-2023-3519, CVE-2023-3466, CVE-2023-3467) in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway), one of which is a zero-day being exploited by... Read more »

Trends in ransomware-as-a-service and cryptocurrency to monitor

In January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business model. Hive is widely believed to be affiliated with... Read more »

Using AI/ML to optimize your tech stack and enhance business efficiency

In this Help Net Security interview, Arthur Hu, SVP, Global CIO and Services & Solutions Group CTO at Lenovo, discusses how AI/ML is optimizing tech stacks, the hurdles anticipated... Read more »

What to do (and what not to do) after a data breach

Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security video,... Read more »

Supply chain executives unaware of growing customer trust issues

Supply chain executives significantly overestimate stakeholder trust in their supply chain capabilities and intentions, according to Deloitte. Of more than 1,000 executives from large global organizations surveyed, 89% on... Read more »

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Improve your cloud security with these 9 proven strategies. Uptycs, alongside renowned expert Lee Atchison, share their list of comprehensive tactics to mitigate risks facing modern development teams. To... Read more »
Subscribe to our Newsletter