Help Net Security

Digital transformation needs data integrity to be successful
The exponential growth of business data, coupled with advancements in cloud computing, AI, and the IoT has unleashed an era of digital transformation across the globe. This is …

Navigating the complexity of ransomware negotiations
Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an …

How IoT is keeping businesses connected in an expanding network
IoT is advancing the technical lives of millions, with the network of connected devices becoming more populated with each passing year. From toothbrushes to toasters, IoT has …

USB threats could critically impact business operations
According to a report released by Honeywell, USB threats that can severely impact business operations increased significantly during a disruptive year when the usage of …

Technical certifications demand growing, most IT employees have at least one
Technical certifications are increasingly in demand with 87% of IT employees possessing at least one and 40% pursuing their next. According to Questionmark, certification …

Many companies believe it is important to protect employee privacy, yet few are effective in doing so
DTEX Systems released a report which revealed a significant workforce privacy gap. The report, conducted by the Ponemon Institute, surveyed a global pool of 1,249 IT and IT …

SMEs strongly positioned in the data protection sector
Small and medium-sized enterprises seem to be strongly positioned in the data protection sector, according to a recent survey of 600 German, French and British executives …

Week in review: Preventing ransomware attacks, SOC burnout, and customizing your ATT&CK database
Here’s an overview of some of last week’s most interesting news and articles: Vulnerabilities in Dell computers allow RCE at the BIOS/UEFI level An estimated 30 …

Third-party identity risk management, compliance, or both?
Third-party risk management and compliance have traditionally gone hand-in-hand. One is a business requirement, the other a business necessity. So, which comes first? Or …

How SMBs are dealing with emerging threats
ECI Software Solutions released a report detailing the findings from a survey examining how SMBs are leveraging technology to respond to the various threats from the past year …

Most businesses to accelerate data security investments in 2021
71 percent of enterprise executives reported their organization’s data and AI timelines have accelerated since the onset of the COVID-19 pandemic, with one in four reporting …

The impact of current and emerging threats on the day-to-day lives of SecOps teams
More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware