Help Net Security

Remote employees encounter 59 risky URLs per week
Working remotely from home has become a reality for millions of people around the world, putting pressure on IT and security teams to ensure that remote employees not only …

Cloud IT infrastructure spending grows, non-cloud investments plunge
Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, increased …

Researchers create tool for protecting children’s online privacy
A University of Texas at Dallas study of 100 mobile apps for kids found that 72 violated a federal law aimed at protecting children’s online privacy. Dr. Kanad Basu, …

Review: Qualys VMDR
It’s 2020 and the importance of vulnerability management should go without saying. In fact, knowing your assets and performing continuous vulnerability management are two of …

Does analyzing employee emails run afoul of the GDPR?
A desire to remain compliant with the European Union’s General Data Protection Regulation (GDPR) and other privacy laws has made HR leaders wary of any new technology that …

New vulnerabilities in open source packages down 20% compared to last year
New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …

Massive complexity endangers enterprise endpoint environments
There’s a massive amount of complexity plaguing today’s enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices – up on average – …

80% of consumers trust a review platform more if it displays fake reviews
Many people are using COVID-19 quarantine to get projects done at home, meaning plenty of online shopping for tools and supplies. But do you buy blind? Research shows 97% of …

Despite COVID-19, 5G progress in connections and deployments continues
5G progress in connections and deployments continues despite the COVID-19 pandemic and resulting economic downturn according to 5G Americas. According to data from Omdia, …

Week in review: The economics of security research, SOC teams battle with burnout
Here’s an overview of some of last week’s most interesting news and articles: SOC team members battle with burnout, overload and chaos While some organizations …

Marred by garbage: Striking a balance for security data
Security applications are subject to the age-old computing axiom of “garbage in, garbage out.” To work effectively, they need the right data. Too much irrelevant data may …

With remote working on the rise, infosec strategies need to evolve
The recent pandemic created a new normal that redefines the way business operates by eliminating security and physical work borders. An Avertium study found that having …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems