Help Net Security

The paradox of post-quantum crypto preparedness
Preparing for post-quantum cryptography (PQC) is a paradox: on the one hand, we don’t know for sure when, or perhaps even if, a large quantum computer will become available …

Only 7% of security leaders are reporting to the CEO
While 60% of organizations have experienced a cyberattack in the last two years and spend approximately $38 million on security activities, only 7% of security leaders are …

It’s time for companies to take a hard look at how they manage secrets
Leaked infrastructure secrets – code, credentials and keys – which are exposed accidentally or intentionally cost companies an average of $1.2 million in revenue …

Defense supply chain vulnerabilities creating security gaps
A BlueVoyant report highlights critical vulnerabilities within the defense supply chain ecosystem. The report includes evidence of the exploitable cyber weaknesses of SMBs …

Ransomware decreases as cybercriminals hit more lucrative targets
McAfee released a report examining cybercriminal activity related to malware and the evolution of cyber threats in the first quarter of 2021. The quarter saw cyber adversaries …

Best practices for IT teams to prevent ransomware attacks
According to Check Point research, the number of organizations affected by ransomware has been growing at 9% monthly since the start of the year. From WannaCry, Petya, and …

Driving network transformation with unified communications
Unified communications (UC) has become a significant part of an organization’s digital transformation strategy, with the aim of establishing strong and reliable communication …

Can blockchain and MPC technology protect the integrity of auctions?
Auctions have stood the test of time. History provides evidence as far back as 500 BC in Babylon by the Romans. Today, the ancient institution that has shaped the trading …

Cloud security skills in high demand
Cloud security is critically important for organizations across the globe as adoption of cloud infrastructure continues to grow at a rapid clip. The shift toward the cloud is …

76% of IT decision makers more vulnerable to mobile attacks than just a year ago
53 percent of IT decision makers admitted that it’s not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices, a survey by …

5G mobile subscriptions to exceed 580 million by the end of 2021
Ericsson projects that 5G mobile subscriptions will exceed 580 million by the end of 2021, driven by an estimated one million new 5G mobile subscriptions every day. 5G mobile …

Embrace integrations and automation as you build a security program
AI, machine learning, continuous compliance, automation, integrations – these are the buzzwords in IT compliance right now. What do they mean and how can a startup or …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform