Help Net Security

Review: Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains, who formerly held many essential roles at Microsoft and is currently working at Amazon Web Services as Regional Leader for Security and Compliance Business …

Managers and employees support digital transformation, but see room for improvement
Digital transformation has widespread support among managers and employees, but some think that the pace of change at their companies could be faster, they could be more …

Week in review: MacOS ransomware, attackers bypassing WAFs, how to select a SIEM solution
Here’s an overview of some of last week’s most interesting news, articles and reviews: Critical flaw opens Palo Alto Networks firewalls and VPN appliances to …

How data science delivers value in a post-pandemic world
With businesses from various industries tightening their belt due to pandemic-induced economic challenges, investing in data science applications and building out their teams …

Lack of technology skills creates a dent in remote workers’ productivity
The lack of technology skills is contributing to a dent in productivity as workers struggle to adapt to working from home over prolonged periods. Questionmark is calling on …

New technique keeps your online photos safe from facial recognition algorithms
In one second, the human eye can only scan through a few photographs. Computers, on the other hand, are capable of performing billions of calculations in the same amount of …

CCPA enforcement to put pressure on financial organizations’ IT resources
Enforcement of the California Consumer Privacy Act (CCPA), which begins on July 1, 2020, is going to put additional pressure on already overstretched IT resources and budgets, …

Using confidential computing to protect Function-as-a-Service data
Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully …

Adopting more tools doesn’t necessarily improve security response efforts
While organizations have slowly improved in their ability to plan for, detect and respond to cyberattacks over the past five years, their ability to contain an attack has …

DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targets
In the first quarter of 2020, DDoS attacks rose more than 278% compared to Q1 2019 and more than 542% compared to the last quarter, according to Nexusguard. Working from home …

CIOs are apprehensive about interruptions due to expired machine identities
TLS certificates act as machine identities, safeguarding the flow of sensitive data to trusted machines. With the acceleration of digital transformation, the number of machine …

40% of security pros say half of cyberattacks bypass their WAF
There are growing concerns around the number of businesses vulnerable to cyberattacks due to hackers’ ability to bypass their Web Application Firewall (WAF), Neustar reveals. …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations