Help Net Security

IoT investment to overtake other Industry 4.0 tech in the near future
Investment in IoT is set to overtake cloud computing, next generation security, big data analytics and other digital transformation technologies in the near future, according …

Analyzing and implementing a national zero trust architecture
This October, we once again find ourselves observing National Cybersecurity Awareness Month. While this effort traditionally targets consumers and businesses, the U.S. …

Cyber risk trends driving the surge in ransomware incidents
During the COVID-19 crisis, another outbreak took place in the cyber space: a digital pandemic driven by ransomware. In a recent report, Allianz Global Corporate & …

Remote access security strategy under scrutiny as hybrid/remote working persists
A report by Menlo Security highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ …

Most employees believe backing up company data is not their problem
Apricorn announced the findings from a Twitter poll exploring data backup and recovery processes. More than 50 percent of respondents noted that they, or their employees, have …

Enterprises increasingly adopting containers, many turning to providers for support
U.S. enterprises increasingly are adopting containers to streamline their applications workflows, with many turning to container services and solutions providers to help them …

400GbE data center switch ports shipments to exceed 10 million this year
Shipments of 400 gigabit Ethernet (GbE) data center switch ports are on track to exceed 10 million this year, more than triple the prior year’s shipments, according to a …

Week in review: Strengthening firmware security, Help Net Security: XDR Report released
Here’s an overview of some of last week’s most interesting news, articles and interviews: Help Net Security: XDR Report has been released The topic of this …

Policy automation to eliminate configuration errors
Far too often, major security breaches can be traced back to a configuration error. Changes and adjustments to network and security configurations are unavoidable; they are a …

Android data sharing remains significant, no opt-out available to users
An in-depth analysis of a range of popular Android mobile phones has revealed significant data collection and sharing, including with third parties, with no opt-out available …

70% of businesses can’t ensure the same level of protection for every endpoint
A Deep Instinct research, which seeks to discover the cybersecurity concerns keeping CISO’s and SecOps professional up at night, found that 86% of UK respondents believe …

Human hacking increased as apps and browsers moved completely to the cloud
Human hacking – phishing attacks across all digital channels – has dramatically increased in 2021. SlashNext released its first report showing a 51% increase in attacks …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform