Help Net Security

Minimizing risk: Key cybersecurity-related M&A considerations
Global M&A hit new highs in 2021 reaching an eye-popping $5.1 trillion in total deal value, according to PwC. With economic headwinds leaving acquisition as the only …

Building trust into every aspect of an organization
In this Help Net Security video, Matthew Chiodi, Chief Trust Officer at Cerby, talks about building trust not just when it comes to applications and data, but also with …

Monitoring the impact of security solutions on user experiences is critical
Modern organizations are challenged by conflicting demands to secure the enterprise while delivering excellent end-user experiences, according to Broadcom Software. The survey …

Trust in fintech security has been wavering
In Q1 of 2022, fintech companies experienced 2.5 times more attacks than in the two previous years. The growing rate of cybercrime has added to the market unrest and …

Week in review: The future of Metasploit, detecting lateral movement, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Beware of password-cracking software for PLCs and HMIs! A threat actor is …

USA’s plan to build its cyber workforce, improve skills-based pathways to cyber jobs
On July 19, 2022, National Cyber Director Chris Inglis hosted the National Cyber Workforce and Education Summit at the White House. The event focused on building the cyber …

Lack of staff and resources drives smaller teams to outsource security
Companies with small security teams continue to face a number of distinctive challenges that place these organizations at greater risk than larger enterprises, according to …

How kitemarks are kicking off IoT regulation
Regulation of the Internet of Things (IoT) has always been a contentious subject. Those against claim it stymies growth of a nascent industry, while those advocating for it …

How to identify and combat online fraud
As the popularity of Buy Now, Pay Later (BNPL) grows, organizations and consumers must remain vigilant or risk becoming a victim of fraud, as account takeover attacks – where …

Detectree: Open-source tool simplifies data analysis for blue teams, reduces alert fatigue
Many companies struggle to understand malicious activity and its effects while a security incident is in progress. It eats up time and resources that defenders need to contain …

Visibility into runtime threats against mobile apps and APIs still lacking
A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …

Companies around the globe still not implementing MFA
SMB owners across the globe are still relying only on usernames and passwords to secure critical employee, customer, and partner data, according to the Global Small Business …
Featured news
Resources
Don't miss
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)
- Maltrail: Open-source malicious traffic detection system