Help Net Security

The security of devices held by public sector employees
Apricorn announced new findings from Freedom of Information (FoI) requests submitted to 16 government departments into the security of devices held by public sector employees. …

Zero-trust security market to reach $64.4B by 2027
Amid the COVID-19 crisis, the global market for zero-trust security estimated at $18.3 billion in the year 2020, is projected to reach a revised size of $64.4 billion by 2027, …

IR and SimEx: Can and should they be standardized?
The National Cyber Security Centre (NCSC) intends to launch a new assurance scheme for incident response (IR) and simulated exercises (SimEx) in Q2 2022, which could become a …

SecOps teams are understaffed and overworked
Organisations have work to do if they want to attract and retain diverse talent in their security operations (SecOps) teams, according to SOC.OS and Sapio Research. SecOps …

Why is intergenerational collaboration critical in advancing zero trust security progress?
Baby Boomers play a critical role in accelerating zero trust security frameworks due to experience in integrating legacy technologies into cloud and hybrid IT environments, an …

Many users don’t know how to protect their broadband Wi-Fi routers
Millions of home broadband Wi-Fi routers in the UK could be at risk because many internet users do not take basic security precautions that could protect them from online …

Mobile device management market to reach $20.4 billion by 2026
The global mobile device management market size to grow from $5.5 billion in 2021 to $20.4 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 29.8% during the …

The CISO’s guide to evaluating third-party security platforms
A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you …

Week in review: 2022 cloud security trends, Microsoft fixes wormable RCE
Here’s an overview of some of last week’s most interesting news, articles and interviews: Phishers are targeting Office 365 users by exploiting Adobe Cloud …

The future of security protocols for remote work
Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a …

Manufacturers are starting to realize the importance of OT security
While rapid technology advances have improved manufacturing operations in recent years, combining new and legacy operational technology (OT) has created security gaps that …

In 2022, AI-based full-suite security is needed
In 2021, ransomware became dinner table conversation. Not only were cybersecurity leaders focused on the ransomware pandemic, but also the general population learned the …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)