Help Net Security

Cybersecurity compliance: Start with proven best practices
As a security professional, you may be tasked with achieving SOC2 compliance for your organization, adopting a NIST framework, or complying with new security laws. These are …

The challenges audit leaders need to look out for this year
Attracting talent with nontraditional skills to audit is the top challenge for audit leaders this year, according to Gartner. A July 2021 survey of 166 audit leaders revealed …

CIOs’ growing responsibilities going beyond IT
A new global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as …

Perimeter intrusion detection systems market to reach $21.3 billion by 2026
The global market for perimeter intrusion detection systems estimated at $11 billion in the year 2020, is projected to reach a revised size of $21.3 billion by 2026, growing …
Jump in attack rates on organizations and individuals
A research from Trend Micro shows how threat actors have increased their attack rate on organizations and individuals, putting digital infrastructure and remote workers at …
The importance of implementing cloud-native security solutions
A Laminar report reveals how companies have increasingly adopted public cloud services, but this overnight change and lack of security controls have led to a jump in data …
Organizations unprepared for a new class of cyber threats: HEAT attacks
Organizations are mostly concerned about ransomware and malware, but despite these growing risks, just 27% have implemented an advanced threat protection on every endpoint …
The impact of ransomware on the cyber insurance market
Recently the threat landscape has been dominated by ransomware, which put the cyber insurance industry under extreme pressure, a Panaseer reserach revealed. 84% of respondents …

Securing DevOps amid digital transformation
There are always new buzzwords/phrases being bandied about. In the late 1990s it was “long tail of the Internet” and “new paradigms”. Then there was this new thing referred to …

The not so scary truth about zero-day exploits
We don’t know what we don’t know; this is the quintessential problem plaguing security teams and the primary reason that zero-day exploits can cause such damage. …

Expanding threat landscape: Cybercriminals attacking from all sides
A research from Trend Micro warns of spiraling risk to digital infrastructure and remote workers as threat actors increase their rate of attack on organizations and …

HEAT attacks: A new class of cyber threats organizations are not prepared for
Web malware (47%) and ransomware (42%) now top the list of security threats that organizations are most concerned about. Yet despite the growing risks, just 27% have advanced …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations