Help Net Security

Digital transformation drives middle market resiliency
Digital transformation has tipped from buzzword to baseline in the middle market, and not a moment too soon. As the COVID-19 pandemic threatens the health of people and …

Enterprise mobile phishing increased by 37% in Q1 2020
There was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020, according to Lookout. …

Cooking up secure code: A foolproof recipe for open source
The use of open source code in modern software has become nearly ubiquitous. It makes perfect sense: facing ever-increasing pressures to accelerate the rate at which new …

Researchers develop IoT security and privacy label
When hungry consumers want to know how many calories are in a bag of chips, they can check the nutrition label on the bag. When those same consumers want to check the security …

Increased attacks and the power of a fully staffed cybersecurity team
The cybersecurity landscape is constantly evolving, and even more so during this time of disruption. According to ISACA’s survey, most respondents believe that their …

Cybercriminals exposed 5 billion records in 2019, costing U.S. organizations over $1.2 trillion
Cybercriminals exposed over 5 billion records in 2019, costing over $1.2 trillion to U.S. organizations, according to ForgeRock. Coupled with breaches in 2018 costing over …

Global revenue from OCP infrastructure market to reach $33.8 billion in 2024
Worldwide revenue from the Open Compute Project (OCP) infrastructure market will reach $33.8 billion in 2024, according to IDC. While year-over-year growth will slow slightly …

Product showcase: Cloudbric Remote Access
Secure remote working is no longer just a buzzword within the cybersecurity realm – it’s become an integral part of the everyday language for all businesses in the COVID-19 …

How do industry verticals shape IAM priorities?
IAM priorities differ by industry vertical, and a one-size-fits-all approach to IAM doesn’t work when every industry and business within that industry is unique, according to …

Most companies suffered a cloud data breach in the past 18 months
Nearly 80% of the companies had experienced at least one cloud data breach in the past 18 months, and 43% reported 10 or more breaches, a new Ermetic survey reveals. According …

Tasks associated with SOX compliance continue to be significant
Only 46 percent of audit teams have been utilizing advanced technologies to optimize SOX compliance activities, a decrease from the previous year’s Protiviti survey …

Lean into zero trust to ensure security in times of agility
Bad actors are rapidly mounting phishing campaigns, setting up malicious websites and sending malicious attachments to take full advantage of the pandemic and users’ need for …
Featured news
Resources
Don't miss
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”