Help Net Security
What do SOC analysts need to be successful?
Gurucul announced the results of a Black Hat USA 2022 security professionals survey with respondents indicating that insider threats were the most difficult type of attack for …
Most critical security gaps in the public cloud
Orca Security released the 2022 State of the Public Cloud Security Report, which provides important insights into the current state of public cloud security and where the most …
Week in review: Uber hacked, QNAP NAS devices under attack, 5 Kali Linux books to read this year
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593) …
Why shift left is burdening your dev teams
Security and compliance challenges are a significant barrier to most organizations’ innovation strategies, according to CloudBees. The survey also reveals agreement among …
How to improve public sector’s security strategy?
With international tensions heightened as we enter month eight of the war between Russia and Ukraine, it’s clear that a new era of intensifying state-sponsored attacks …
How serious are organizations about their data sovereignty strategies?
Scality announced the results of an independent survey of IT decision makers across France, Germany, the UK, and the US about their data sovereignty strategies. 98% of …
Most organizations consolidate to improve risk posture
A recent survey by Gartner found that 75% of organizations are pursuing security vendor consolidation in 2022, up from 29% in 2020. “Security and risk management leaders are …
Linux variant of the SideWalk backdoor discovered
ESET researchers have discovered a Linux variant of the SideWalk backdoor, one of the multiple custom implants used by the SparklingGoblin APT group. Commands with different …
Developers are struggling to keep up with ongoing security activities
Security Compass has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their …
Organizations lack visibility into unauthorized public cloud data access
Laminar released findings from its 2022 Security Professional Insight Survey conducted at AWS re:Inforce in July 2022 and Black Hat in August 2022. The research revealed gaps …
Q-Day doesn’t equal doomsday: Enacting an enterprise quantum security strategy
While Quantum Day, or “Q-Day,” may be five to ten years away, it is arriving faster than we would like. Q-Day represents the day that quantum computers will reliably use the …
6 key challenges technologists are facing today
Every organization that interacts with customers or consumers via web and mobile applications, and also as they transition to a hybrid workspace, means that they are …
Featured news
Resources
Don't miss
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts
- The year ahead in cyber: What’s next for cybersecurity in 2026
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims