Help Net Security

How to prevent permission bloat: Overlooked and hidden access
When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization …

Why you should be rushing to deploy multi-factor authentication to support remote work
With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …

Preventing account takeover and social engineering attacks
Since the COVID-19 outbreak, digital fraud has increased significantly, especially when it comes to account takeover. In this Help Net Security podcast, Angie White, Senior …

Half of IT pros believe their cybersecurity teams are ready to detect attacks
A surprising 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to rising cybersecurity …

Online learning surges as people look for ways to be productive at home
People around the world are learning how to work from home and stay productive in response to COVID-19, Udemy reveals. As remote working becomes the new normal, the findings …

Protecting corporate data in popular cloud-based collaborative apps
Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business …

CCPA privacy requests cost business up to $275k per million consumer records
Organizations who plan on manually processing CCPA data subject requests (DSRs) or data subject access requests will spend between $140k – $275k per million consumer …

Consumers will opt for competitors after a single ransomware-related service disruption
While most consumers are taking necessary security precautions to protect their online accounts, businesses may not be doing enough to protect their information – …

Despite spending more on compliance, businesses still have basic IT weaknesses
There is a misalignment between data privacy regulation spending and business outcomes, according to Tanium research. Specifically, as businesses spend tens of millions on …

5G infrastructure market estimated to reach $44.9 billion by 2025
Post COVID-19, the 5G infrastructure market is estimated to grow from $12.6 billion in 2020 and projected to reach $44.9 billion by 2025, at a CAGR of 28.97%, according to …

CISSP online self-paced training only $561 for a limited time
Is achieving the CISSP one of your 2020 goals? (ISC)² is here to help you stay on track to achieving your CISSP certification. For a limited time, get Official (ISC)² CISSP …

Week in review: API security basics, the future of infosec conferences, Sophos firewalls under attack
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Is the future of information security and tech conferences virtual? While …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform