Help Net Security
                                The CISO as brand enabler, customer advocate, and product visionary
Just over a quarter-century ago, the first Chief Information Security Officer (CISO) was minted in the financial vertical, and everyone lived happily ever after. The End. If …
                                Security flaws found in 82% of public sector software applications
Veracode has released new findings that show the public sector has the highest proportion of security flaws in its applications and maintains some of the lowest and slowest …
                                Mainframe still powering critical business operations
Rocket Software released a report, based on a survey of over 500 U.S. IT professionals in firms using mainframes focused on their priorities, challenges and plans for …
                                Vulnerabilities and cyberattacks that marked the year 2021
Rapid7 announced the release of a report examining the 50 most notable security vulnerabilities and high-impact cyberattacks in 2021. On any given day, security professionals …
                                IT in manufacturing insufficiently prepared to support long-term hybrid work
Riverbed | Aternity reveals that 51% business decision makers (BDMs) in the manufacturing industry believe that 50% of their workforce will remain hybrid post-pandemic. …
                                Application security market to reach $13.1 billion by 2025
The potential growth difference for the application security market between 2020 and 2025 is $13.1 billion, as per the latest market analysis report by Technavio. The report …
                                Week in review: Spring4Shell vulnerability, attackers exploiting patched RCE in Sophos Firewall
Here’s an overview of some of last week’s most interesting news, articles and interviews: Spring4Shell: No need to panic, but mitigations are advised Security teams around the …
                                Results overview: 2022 MITRE ATT&CK Evaluation – Wizard Spider and Sandworm edition
UPDATE: Monday, April 4, 07:48 AM Since the publication of this opinion piece, we have been made aware of a number of conflicting viewpoints regarding the conclusions made in …
Organizations need to up their cloud native security strategy
Organizations still have a long way to go to understand, plan and deploy their cloud native security strategies, an Aqua Security study reveals. Many cloud native applications …
                                Spring4Shell: New info and fixes (CVE-2022-22965)
In this video for Help Net Security, Ax Sharma, Senior Security Researcher at Sonatype, talks about the latest developments regarding Spring4Shell, the unauthenticated RCE …
                                We need an industry-backed, tech-neutral resource to restore trust in voice communications
With illegal robocalls now representing nearly half of all unwanted calls in the U.S., consumers are opting to simply not pick up their phones. In fact, studies show that in …
                                JavaScript security: The importance of prioritizing the client side
In this interview with Help Net Security, Vitaliy Lim, CTO at Feroot, talks about the most common JavaScript threats, the devastating impact of malicious or vulnerable code, …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military