Help Net Security

Office workers unwilling to change their behavior, despite being aware of the cybersecurity challenges
Despite office workers being aware of the cybersecurity challenges faced by their employer – especially when it comes to hybrid working – many admit to high risk …

3-D Secure transactions growth fueled by card-not-present explosion and PSD2
A massive $100 billion in transactions in 2021 alone have been protected by 3-D Secure payments authentication technology, Outseer reveals. The report also reveals continued …

How to retain the best talent in a competitive cybersecurity market
We are currently experiencing The Great Resignation, where millions of people are leaving their jobs in search of increased satisfaction. The global pandemic gave many the …

What businesses need to know about data decay
Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer …

Zero trust security solutions widely adopted, spurred by surge in ransomware
Over a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the …

Ransomware still a primary threat as cybercriminals evolve tactics
Trend Micro announced that it blocked 40.9 billion email threats, malicious files, and malicious URLs for customers in the first half of 2021, a 47% year-on-year increase. …

Tech pros reporting a positive perception of their roles, looking forward to what lies ahead
Amidst ongoing pandemic-driven change at work and at home, a SolarWinds survey seeks to understand how tech pros feel about their daily roles and responsibilities, the lessons …

Cloud and online backups increasing in popularity, but tape usage remains
15% of organizations are still using a combination of disk and tape backups, with 51% now using online or cloud backups, a research by Databarracks has revealed. The annual …

How do you measure the impact of security? Find out at SecTalks 2021
How are businesses learning, collaborating, and applying industry best practices? The half-day SecTalks 2021 virtual cybersecurity conference will look at how to quantify …

Week in review: Kali Linux 2021.3, how to avoid cloud configuration breaches, hybrid digital dexterity
Here’s an overview of some of last week’s most interesting news, articles and interviews: Apple fixes “zero-click” iMessage zero-day exploited to deliver spyware …

The digital identity imperative
The ever-evolving shift to digital means that most of our day-to-day activities are carried out online. We’re now accustomed to simply toggling through a few apps to book a …

Open source cyberattacks increasing by 650%, popular projects more vulnerable
Sonatype released a report that revealed continued strong growth in open source supply and demand dynamics. Further, with regard to open source security risks, the report …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous