Help Net Security

The everywhere workplace is here to stay
63% of respondents said they would rather work remotely than be promoted, and 48% said they would take a pay cut in exchange to be able to work from anywhere, an Ivanti survey …

The power of positive reinforcement in combating cybercriminals
Funnily enough, humans aren’t too different from dogs when it comes to changing a behavior for the better. One of the most powerful leadership tools is positive …

The most important point in a cyberattack is before it happens
Let’s get the scary thing out of the way: more than half of businesses have dealt with a serious security breach in the last two years. The chances of one happening are so …

Adapting the network for a remote working future
In the wake of the 2008 financial crisis, there was a big emphasis on stress testing major banks to determine if they have the reserves and processes to withstand such an …

Operation HAECHI-I intercepts $83M in online financial crimes
Amid an exponential increase in online fraud, an INTERPOL-coordinated operation codenamed HAECHI-I mobilized more than 40 specialized law enforcement officers across the Asia …

AI-based diagnostic processes that safeguard data privacy
Digital medicine is opening up entirely new possibilities. For example, it can detect tumors at an early stage. But the effectiveness of new AI algorithms depends on the …

A CISO’s Guide: Mitigating the Human Risk Factor
Security teams deploy several technologies to protect their attack vectors (network, endpoints, email, web, cloud apps, etc.). But what about the human attack surface? …

Cybersecurity industry analysis: Another recurring vulnerability we must correct
I have spent my career finding, fixing, discussing, and breaking down software vulnerabilities, one way or another. I know that when it comes to some common security bugs, …

EUCC receives first EU cybersecurity certification scheme
In July 2019, the EUCC was the first candidate cybersecurity certification scheme request received by the EU Agency for Cybersecurity (ENISA) under the Cybersecurity Act. This …

Endpoint complexities leaving sensitive data at risk
Absolute Software announced key findings from its report which shines a light on key trends affecting enterprise data and device security, and underscores the dangers of …

The human cost of understaffed SOCs
SOC and IT security teams are suffering from high levels of stress outside of the working day – with alert overload a prime culprit, a Trend Micro study reveals. …

Security leaders more concerned about legal settlements than regulatory fines
An overwhelming 90% of security leaders are concerned about group legal settlements following a serious data breach, compared to 85% who are worried about regulatory fines, …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?