Help Net Security

November 2022 Patch Tuesday forecast: Wrapping up loose ends?
October 2022 Patch Tuesday was a little unusual last month, as it ‘kind of’ repeated itself the following week. Microsoft turned around and released a series of non-security …

Outmaneuvering cybercriminals by recognizing mobile phishing threats’ telltale markers
Preventative medicine has long been recognized as a vital approach in safeguarding our physical health. We take a variety of tests and assessments so that doctors can uncover …

Privacy, compliance challenges businesses face after Roe v. Wade repeal
In this Help Net Security video, Rebecca Herold, IEEE member and CEO of Privacy & Security Brainiacs, discusses data, privacy, surveillance, and compliance challenges …

The most frequently reported vulnerability types and severities
Bishop Fox collected and analyzed publicly disclosed reports from January to July 2022 to better understand the most frequently reported vulnerability types, the …

The biggest threat to America’s election system? Ourselves
With midterm elections right around the corner, many Americans are questioning whether they can trust the election process. To be honest, this is fair, given the highly …

Top 4 priorities for cloud data protection
Recent BigID research found that 86% of organizations use multiple cloud platforms to store their data- across IaaS, PaaS, and SaaS. As the reliance on cloud services …

Open-source software fosters innovation, but only with the right controls in place
In businesses of all sizes, open-source software is a crucial component of the software supply chain, but the OSS supply chain is also facing new security issues – calling for …

Cybersecurity recovery is a process that starts long before a cyberattack occurs
While most organizations have insurance in case of cyberattacks, the premium they pay depends on how the business identifies, detects and responds to these attacks – and …

Businesses want technologies that allow for passwordless workflows
Bitwarden announced the results of its 2023 Password Decisions Survey, which polled 800 IT decision makers across a wide range of industries, showing that passwordless …

Group indicted for breaching CPA, tax preparation firms via stolen credentials
United States Attorney Roger B. Handberg announces the partial unsealing of an indictment charging eight individuals with Racketeer Influenced and Corrupt Organizations (RICO) …

How to deal with burnout when you’re the CISO
CISOs are working overtime and can’t always switch off from work, according to a recent Tessian report. Recent headlines have shown that security stakes have never been …

Alternatives to a lift-and-shift cloud migration strategy
For most organizations operating in today’s digital landscape, shifting even their most mission-critical workloads from traditional on-premises or colocation-based data …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems