Help Net Security

Federal defense contractors are not properly securing military secrets
Defense contractors hold information that’s vital to national security and will soon be required to meet Cybersecurity Maturity Model Certification (CMMC) compliance to …

Security pros feel threat detection and response workloads have increased
A new report conducted by Enterprise Strategy Group (ESG) highlights why today’s security teams find it increasingly difficult to detect and stop cyber threats targeting their …

Infosec products of the month: November 2022
Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Acronis, Bearer, Bitdefender, Clumio, Cohesity, Flashpoint, …

IoT device origin matters more than ever
Recently, British politicians called on the government to crack down on the use of surveillance equipment from two Chinese companies, Hikvision and Dahua, which are already …

How to find hidden data breaches and uncover threats in your supply chain
In this article, we’ll help you: Understand how breaches can stay hidden inside your supply chain Determine if your supplier relationships are increasing your risk Assess your …

Identifying key areas for fraud risk during the recession
As economic pressure increases, so does fraud risk. While the world slides into a recession, the resulting increased debt, supply chain delays, and inflation create increased …

33% of attacks in the cloud leverage credential access
Elastic released the 2022 Elastic Global Threat Report, detailing the evolving nature of cybersecurity threats, as well as the increased sophistication of cloud and …

CISOs’ priorities for the coming year
BlueFort Security has announced the results of its 2022 CISO survey, which revealed that while CISOs are still experiencing challenges around visibility, intelligence and …

Here’s the deal: Uptycs for all of 2023 for $1
Customers are shifting their cybersecurity up with Uptycs. Now, for only a buck, you can shift up, too: Automate security and connect insights across your enterprise—cloud, …

EU Council adopts the NIS2 directive
The European Council adopted legislation for a high common level of cybersecurity across the Union, to further improve the resilience and incident response capacities of both …

CISOs in investment firms help fast-track cybersecurity startups
In this Help Net Security video, Frank Kim, CISO-in-Residence at YL Ventures, discusses the growing role of CISOs in investment firms and how their role as advisors helps …

How an effective fraud prevention strategy can force fraudsters to invest more in their attacks
Since the early stages of the pandemic, account takeover fraud (ATO) has significantly transformed, quickly becoming one of the fastest-growing cybersecurity threats with 22% …
Featured news
Resources
Don't miss
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
- Using lightweight LLMs to cut incident response times and reduce hallucinations
- Fractional vs. full-time CISO: Finding the right fit for your company
- Product showcase: iStorage datAshur PRO+C encrypted USB flash drive
- Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)