Help Net Security

Understanding third-party hacks in the aftermath of SolarWinds
In the aftermath of the SolarWinds hack, a better understanding of third-party hacks in any update that you provide to your colleagues, bosses, and even the board of directors …

Fraudulent attempt purchase value decreased by $10 in 2020 compared to 2019
There has been a 24 percent increase in eCommerce transactions globally in December 2020 compared to December 2019, ACI Worldwide reveals. In particular, eCommerce …

Revenue for 5G enterprises in the Asia-Pacific region to reach $13.9B by 2024
Mega trends across the government and public sector, healthcare, manufacturing, and telecommunications are posing new challenges to end users in vertical industries in the …

Minimizing cyberattacks by managing the lifecycle of non-human workers
The number of non-human workers is growing, particularly as global organizations increasingly prioritize cloud computing, DevOps, IoT devices, and other digital transformation …

Healthcare IT teams battle with technical challenges to ensure network resilience and security
IDG surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities. The goal was to shed light on how …

43% of financial services orgs plan to increase private cloud investments
Nutanix announced the financial services industry findings of its report, measuring organizations’ plans for adopting private, hybrid and public clouds. The findings point to …

The future history of medical device cybersecurity
In 1555, Nostradamus published his famous Les Prophéties containing obfuscated prophecies for the world to come. Some believe that one of these predictions pertains to the …

SOC analysts overloaded, but role more important than ever
Organizations are spending more to account for widespread security operation center (SOC) challenges including growing security management complexity, increasing analyst …

It’s time for a national privacy law in the US
Consumer data privacy is no longer a necessary evil but a competitive differentiator for any company participating in the global economy. The EU’s GDPR represents the world’s …

Addressing the lack of knowledge around pen testing
The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will …

Five emerging fraud threats facing businesses in 2021
With the growing threat of fraud fueled by the digital acceleration that took place in 2020, Experian revealed five emerging fraud threats facing businesses in 2021. The rapid …

Top videoconferencing attacks and security best practices
Videoconferencing has become a routine part of everyday life for remote workers, students, and families. Yet widespread adoption of this technology has also attracted …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware