Help Net Security

The dangers of orphaned data and what companies can do about it
Orphaned data is data that still sits on an organization’s network but was created and owned by a now deactivated employee. In this Help Net Security video, Carl …

Smart buildings may be your cybersecurity downfall
According to a recent eEnergy report, 30 per cent of all purchased energy in the UK is currently wasted in commercial buildings, warehouses and education facilities. Whilst …

Alternative payment methods are creating new fraud risks
A Juniper Research study found that the total cost of eCommerce fraud to merchants will exceed $48 billion globally in 2023, from just over $41 billion in 2022. It predicted …

Fear of cybercriminals drives cybersecurity improvements
Fortifying cybersecurity defenses remains a work in progress for many organizations, who acknowledge their shortcomings but have yet to commit the necessary resources to the …

What you should look for in an MDR relationship
The managed IT services market is growing both in size and importance, as more organizations decide it makes fiscal and operational sense to outsource key functions. This is …

Cost-effective steps healthcare CISOs can take to mitigate damaging attacks
Cybersecurity measures are increasingly failing to close gaps, and the healthcare industry, in particular, has become a high-dollar target due to limited budgets and quick …

Here’s 5 of the world’s riskiest connected devices
Forescout’s research team analyzed 19 million connected devices deployed across five different industries, to find the riskiest device groups: smart buildings, medical …

New RSA Conference CEO talks about delivering value
Kylie Wright-Ford was recently named CEO of RSA Conference LLC. She joins RSAC with an extensive track record of building communities for business professionals, having served …

Consumers want more transparency on how companies manage their data
Cisco published its 2022 Consumer Privacy Survey, an annual global review of consumers’ perceptions and behaviors on data privacy, highlighting the critical need for further …

Why paying the ransom is a mistake
New research from Databarracks reveals 44% of organizations that suffered a ransomware attack, paid the ransom. 34% recovered from backups, while 22% used ransomware …

How to improve employees’ cybersecurity behavior
We already have cybersecurity behaviors we learned from elsewhere, especially those who have grown up with technology. Initially, cybersecurity starts from home and school, …

Constellation: Open-source, runtime-encrypted Kubernetes
Confidential Computing is a hardware-based technology that shields computer workloads from their environments and keeps data encrypted during processing. In this Help Net …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices