Help Net Security

Security priorities are geared toward ongoing remote and hybrid work
Nearly two years into the pandemic, SME IT admins report they’re considered an important voice in company operations and fewer are feeling overwhelmed despite facing continued …

Adoption of private 5G networks accelerates, as organizations look to improve security and speed
There’s a significant interest in private 5G networks, with 90% of executives expecting that private 5G will become the standard network choice, according to an …

Product showcase: Is Crystal Eye XDR the most comprehensive security platform on the market?
In this product showcase, we look at Red Piranha’s Crystal Eye XDR platform. Red Piranha pioneered the integrated security service model back in 2015 with out of the box MDR …

Password offenders: Who’s the naughtiest of them all?
In 2021, we’re celebrating the 60th anniversary of the computer password’s invention, but it also marks the year of some of the worst password mishaps this century. To honor …

Passwordless verification API transforms every mobile phone into a security token for zero trust access
What is small, tamper-proof, cryptographically secure, and already used by 6.37 billion people? The SIM card. We carry this compact piece of secure tech everywhere without …

How healthcare providers handle safeguards to protect payment and PII
Semafone released a survey which aimed to identify the underlying consumer sentiment on payment experiences with their healthcare providers. Over the last 20+ months, the …

Why are data professionals investing in data governance programs?
Precisely and Drexel University’s LeBow College of Business (LeBow) released findings from their data management survey. The report provides insights into the potential …

Foundational cloud security with CIS Benchmarks
Cloud service providers (CSPs) have changed the way organizations of all sizes architect and deploy their IT environments. CSPs now make it possible for organizations to …

The cyber risk future doesn’t look good, but organizations are ready
A Trend Micro report predicts global organizations will emerge more alert and better prepared in 2022 thanks to a comprehensive, proactive, cloud-first approach to mitigating …

Hybrid work is dead, long live “work”
As we head into 2022, work will no longer be distinguished by where an employee (or student) is working or learning from. Work from wherever, on whatever device, will simply …

Employees think they’re safe from cyberthreats on company devices
A research launched by Menlo Security reveals increased cybersecurity risks posed to employees and organizations during the 2021 holiday shopping season. The research – which …

How to thwart SIM swapping attacks?
SIM swapping attacks have been reported in the media since 2017. Such attacks usually target banking transactions but not only. These attacks are also perpetrated against the …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC