Help Net Security

ICS threat landscape highlights
Dragos releases annual analysis of ICS/OT focused cyber threats, vulnerabilities, assessments, and incident response insights. “In 2020, the industrial community performed …

Why enterprises need rugged devices with integrated endpoint management systems
The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …

Five factors driving investment in IDV
For billions of individuals around the world, digital identity became critical in 2020. As a result, the global identity verification market, which was already growing rapidly …

Attackers disrupting COVID-19 efforts and critical supply chains
Cyberattacks evolved in 2020 as threat actors sought to profit from the unprecedented socioeconomic, business and political challenges brought on by the COVID-19 pandemic, IBM …

C-level executives driving the adoption of MACH across their organizations
Out with the old, in with MACH. That’s what a poll of global IT leaders found regarding their plans to revamp, or retain, their enterprise architectures. The research, …

Users largely unaware of the privacy implications of location tracking
How much personal information can our phone apps gather through location tracking? To answer this question, two researchers – Mirco Musolesi (University of Bologna, …

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?
In 2020, the pandemic was a radical turning point in the way we work. Office workers were forced to give up their commute and work from home. People from a whole range of …

Third-party risk management programs still largely a checkbox exercise
Enterprise third-party risk management (TPRM) programs have been around for a half-decade or longer, and at this point most large organizations run one. However, many of these …

U.S. municipalities are the perfect target for cybercriminals in 2021
On Feb 5th, 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, and was able to adjust the amount of sodium hydroxide in the water from 100 …

Most businesses see state-sponsored cyberattacks as a major threat
A majority of businesses surveyed for a study by the Economist Intelligence Unit (EIU) and the Cybersecurity Tech Accord, see state-led and sponsored cyberattacks as a major …

Researchers propose more secure and private mobile contact tracing
For public health officials, contact tracing remains critical to managing the spread of the coronavirus — particularly as it appears that variants of the virus could be …

Whitepaper – EDR to secure mobile devices: Coverage, limits & recommendations
The digitalization of services and expansion of remote working has heightened the number of off-premises users accessing cloud-based resources from their mobile device. In …
Featured news
Resources
Don't miss
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
- New framework aims to outsmart malware evasion tricks
- Finding connection and resilience as a CISO
- AI isn’t taking over the world, but here’s what you should worry about
- Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations