Help Net Security

Ransomware preparedness: What are you doing wrong?
Axio released its 2022 State of Ransomware Preparedness research report, revealing that although notable improvements have been made since Axio’s 2021 report, organizational …

CIS Benchmarks: Community driven security guidelines
CIS Benchmarks are the only consensus-developed security configuration recommendations both created and trusted by a global community of IT security professionals from …

Secure portable operating system Tails 5.5 released
Tails, based on Debian GNU/Linux, is a portable operating system that protects against surveillance and censorship, and version 5.5 is now available for download. When …

Upgrade your security awareness efforts: Here’s how to start
October is Security Awareness Month, an exciting time as organizations around the world train people how to be cyber secure, both at work and at home. But what exactly is …

How to secure microservices using authorization
IT organizations looking to continue their digital transformation journey are faced with a choice – choosing between a more cost-effective, simple monolithic system or a more …

Fines are not enough! Data breach victims want better security
Recent research from Thales has found that malware, ransomware, and phishing continue to plague global organizations. 21% have experienced a ransomware attack in the last …

The future of MFA is passwordless
Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more …

CISOs, rejoice! Security spending is increasing
Three factors influencing growth in security spending are the increase in remote and hybrid work, the transition from virtual private networks (VPNs) to zero trust network …

7 critical steps to defend the healthcare sector against cyber threats
While knowing full well that human lives may be at stake, criminal gangs have been increasingly targeting the healthcare sector with high-impact attacks like ransomware. 1. …

Deepfakes: What they are and how to spot them
The term “deepfake” is used for photo, video or audio content that has been manipulated to make it seem that the subject is doing or saying something they never did or said. …

AI can help you optimize your supply chain
There are three key questions concerning artificial intelligence (AI) in the supply chain: Where are we today and what are some of the tailwinds driving the implementation of …

Product showcase: Scribe platform’s end-to-end software supply chain security
As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams are more challenged than ever to build transparent trust in the software …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?