Help Net Security

Developing a plan for remote work security? Here are 6 key considerations
With so many organizations switching to a work-from-home model, many are finding security to be increasingly more difficult to administer and maintain. There is an influx of …

Nine out of ten IT pros have experienced a data breach
Exonar, has today published research revealing that 94 percent of IT pros have experienced a data breach, and an overwhelming majority (79 percent) are worried that their …

Most dev and IT practitioners work extra hours resolving incidents
PagerDuty released a new worldwide study highlighting that more than 80% of organizations have experienced a significant increase in pressure on digital services since the …

Product showcase: Cynet 360, 2020 Fall Platform Update
We are in dire need of approaches that simplify and consolidate the cybersecurity toolset so that companies can afford the coverage required and to make effective breach …

Most compliance requirements are completely absurd
Compliance is probably one of the dullest topics in cybersecurity. Let’s be honest, there’s nothing to get excited about because most people view it as a tick-box exercise. It …

Organizations must rethink traditional IT strategy to succeed in the new normal
64% of IT pros are instilled with a new sense of confidence, despite contending with challenges such as reduced budgets, greater decision-making responsibilities, and longer …

What happens to funds once they have been stolen in a cyberattack?
SWIFT and BAE Systems published a report that describes the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the …

Intelligent processes and tech increase enterprises’ competitiveness
Enterprises of the future will be built on a foundation of artificial intelligence (AI), analytics, machine learning, deep learning and automation, that are central to solving …

(ISC)² Exam Action Plan: Get your certification goals on track for success
Even the best-laid plans can go astray, that’s why we stand ready as ever to help you get your certification goals back on track for success. Every (ISC)² member started out …

Mapping the motives of insider threats
Insider threats can take many forms, from the absent-minded employee failing to follow basic security protocols, to the malicious insider, intentionally seeking to harm your …

Cybersecurity after COVID-19: Securing orgs against the new threat landscape
Picture this: An email comes through, offering new COVID-19 workplace safety protocols, and an employee, worn down by the events of the day or feeling anxious about their …

Global security appliance market revenue grew to $4.2B in Q2 2020
The total security appliance market delivered solid unit shipment and revenue growth in the second quarter of 2020 (2Q20), according to IDC. Worldwide revenue increased 7.5% …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware