Help Net Security

EU Commission: The GDPR has been an overall success
The European Commission has published an evaluation report on the General Data Protection Regulation (GDPR), two years after the regulation became enforceable. Two years of …

SOC team members battle with burnout, overload and chaos
While some organizations have increased security operations center (SOC) funding, the overall gains have been meager, and the most significant issues have not only persisted, …

Core cybersecurity principles for new companies and products
The rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19 have shifted consumer behavior. The findings of a report by the World Economic …

Why identity-based, distributed controls are better suited to address cloud-era threats
With more and more IT resources moving to the cloud and remote work becoming a ubiquitous business practice due to COVID-19, perimeter-based security is undeniably becoming a …

Duration of application DDoS attacks increasing, some go on for days
There were seven major application DDoS attacks over the previous month — two of which lasted 5-6 days, Imperva reveals. Additionally, the team found that 47% of account …

With regard to industrial cyber, we can no longer hide our heads in the sand
The massive attack on national infrastructures in Australia, only recently publicized, as well as the attack on Israel’s water infrastructure, do well to illustrate the …

Most malware in Q1 2020 was delivered via encrypted HTTPS connections
67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections and 72% of encrypted malware was classified as zero day, so would have evaded signature-based …

Study of global hackers and the economics of security research
Human ingenuity supported by actionable intelligence were found to be critical ingredients to maintaining a resilient infrastructure, Bugcrowd reveals. In fact, 78% of hackers …

Employees often overlooked when companies adopt new technology
Companies are placing business and shareholder goals above employee needs when they adopt new technology, according to Lenovo. The research, conducted among 1,000 IT managers …

New technique protects consumers from voice spoofing attacks
Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …

How to protect remote workers from phishing and other attacks
Working from home is a new ‘norm’ for many organizations, but the shift toward remote work has been steadily increasing for the past decade. In fact, between 1996 and 2016 …

Fixing all vulnerabilities is unrealistic, you need to zero in on what matters
As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems