Help Net Security

Why do healthcare organizations have a target on their back?
Medical records command a high value on the dark web due to the large amount of personal information they hold. Cybercriminals can sell stolen healthcare data for a massive …

Terrascan open source software helps developers build secure cloud infrastructure
Accurics unveiled a major upgrade to Terrascan, the open source static code analyzer that enables developers to build secure infrastructure as code (IaC). The new release …

Publicly reported data breaches down 52%, exposed records way up!
Although the number of publicly reported data breaches stands at its lowest in five years, the number of records exposed is more than four times higher than any previously …

Pandemic accelerates investments in tech, automation, workplace transformation
Umpqua Bank released a survey gauging the impact of the COVID-19 pandemic on the confidence and future of U.S.-based small and mid-size businesses. More than 1,200 leaders at …

3 tips to increase speed and minimize risk when making IT decisions
There is nothing like a crisis to create a sense of urgency and spawn actions. This is especially true for enterprise IT teams, who are tasked with new responsibilities and …

Users turn to independent search engines for privacy, but also get misinformation
Anti-vaccine websites, which could play a key role in promoting public hesitancy about a potential COVID-19 vaccine, are far more likely to be found via independent search …

Internal audit leaders should develop new skills to stay relevant
Chief audit executives (CAEs) and internal audit leaders report their next-generation competency levels in three vital areas – governance, methodology and enabling technology …

Healthcare breaches declined sharply during the first half of 2020
This has been a very challenging year. Despite the COVID-19 outbreak starting in the first half of 2020, data analyzed from the Health and Human Services (HHS) Office for …

Army researchers awarded patent for secure comms
Army researchers have been awarded a patent for inventing a practical method for Army wireless devices to covertly authenticate and communicate. Photo by Jason Edwards …

Week in review: vBulletin 0-day, open source projects under attack, critical security updates galore
Here’s an overview of some of last week’s most interesting news and articles: Intel, SAP, and Citrix release critical security updates August 2020 Patch Tuesday …

In reality, how important is zero trust?
Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to …

CIOs prioritizing IAM over endpoint security and security awareness training
CIOs are prioritizing identity and access management (IAM) over endpoint security and security awareness training in 2020, according to a Hitachi ID survey. The survey, …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations