Help Net Security
The companies most likely to lose your data
Web companies are most likely to lose your data, a study shows. The study, conducted by VPN Overview, analysed major data breaches that have been registered since 2004 to …
(ISC)² to aid cybersecurity professional development in emerging economies
(ISC)² has signed a Memorandum of Understanding (MOU) with the Korea Internet & Security Agency (KISA) to strenghten cybersecurity professional development in emerging …
Why chasing risk assessments will have you chasing your tail
Third-party risk assessments are often described as time-consuming, repetitive, overwhelming, and outdated. Think about it: organizations, on average, have over 5,000 third …
Product showcase: ImmuniWeb Discovery – attack surface management with dark web monitoring
Organizations around the globe struggle to identify their IT assets hosted in a multicloud environment, on premise or managed by numerous third parties. The lack of visibility …
The most dangerous connected devices
The growing number and diversity of connected devices in every industry present new challenges for organizations to understand and manage the risks they are exposed to. In …
Open banking API security: Best practices to ensure a safe journey
More than 9 in 10 financial sectors accept that open banking is vital to their organization. The demand for fast, hassle-free, and personalized banking and financial services …
Ransomware preparedness: What are you doing wrong?
Axio released its 2022 State of Ransomware Preparedness research report, revealing that although notable improvements have been made since Axio’s 2021 report, organizational …
CIS Benchmarks: Community driven security guidelines
CIS Benchmarks are the only consensus-developed security configuration recommendations both created and trusted by a global community of IT security professionals from …
Secure portable operating system Tails 5.5 released
Tails, based on Debian GNU/Linux, is a portable operating system that protects against surveillance and censorship, and version 5.5 is now available for download. When …
Upgrade your security awareness efforts: Here’s how to start
October is Security Awareness Month, an exciting time as organizations around the world train people how to be cyber secure, both at work and at home. But what exactly is …
How to secure microservices using authorization
IT organizations looking to continue their digital transformation journey are faced with a choice – choosing between a more cost-effective, simple monolithic system or a more …
Fines are not enough! Data breach victims want better security
Recent research from Thales has found that malware, ransomware, and phishing continue to plague global organizations. 21% have experienced a ransomware attack in the last …
Featured news
Resources
Don't miss
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts
- The year ahead in cyber: What’s next for cybersecurity in 2026
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims