Help Net Security

How confident are companies in managing their current threat exposure?
Crossword Cybersecurity has released a report based on the findings of a survey of over 200 CISOs and senior UK cyber security professionals. The paper reveals companies are …
How CISOs are adjusting in the wake of two years of pandemic disruption
Proofpoint released its annual Voice of the CISO report, which explores key challenges facing chief information security officers. While the world’s CISOs spent 2021 coming to …

How to navigate GDPR complexity
There’s been a lot of turbulence in the data privacy regulation space in the past couple of years. Post Brexit, there was a risk for the UK to be digitally isolated from …

Where is attack surface management headed?
Reactive cyber defense is a losing strategy. It’s something that’s been tolerated for many decades, but isn’t it more cost-effective, better for the brand, and more optimal to …

Elevation of Privilege is the #1 Microsoft vulnerability category
BeyondTrust announced the release of a report which includes the latest annual breakdown of Microsoft vulnerabilities by category and product, as well as a six-year trend …
Can we trust the cybersecurity of the energy sector?
A research published by DNV reveals that energy executives anticipate life, property, and environment-compromising cyberattacks on the sector within the next two years. The …

Keeping pace with emerging threats: The roundup
Egress issued its mid-year 2022 threat report offering details of emerging threats along with insights about protecting employees, customers, and businesses from these …
Paying the ransom is not a good recovery strategy
A Veeam report has found that 72% of organizations had partial or complete attacks on their backup repositories, dramatically impacting the ability to recover data without …
Since organizations apply more compliance programs, proper planning is essential
A-LIGN released its 2022 Compliance Benchmark Report, highlighting the concern over increased threat of ransomware attacks and the need for organizations to adopt a more …

Taking the right approach to data extortion
Cybercriminals often specialize. An extortion effort usually begins with a person or a team selecting targets in one of two ways: either they get a request from an …

What does prioritizing cybersecurity at the leadership level entail?
Week after week, month after month, shareholder cyber lawsuits hit the news. Capital One settles for $190 million. A class-action lawsuit was filed against Ultimate Kronos …

Vishing cases reach all time high
Vishing (voice phishing) cases have increased almost 550 percent over the last twelve months (Q1 2022 to Q1 2021), according to the latest Quarterly Threat Trends & …
Featured news
Resources
Don't miss
- China-linked Murky Panda targets and moves laterally through cloud services
- Five ways OSINT helps financial institutions to fight money laundering
- DevOps in the cloud and what is putting your data at risk
- Russian threat actors using old Cisco bug to target critical infrastructure orgs
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged