Help Net Security

Download PPT template: Build your 2020 security plan
The end of the year is coming and it’s time for security decision makers to make plans for 2020 and get management approval. Typically, this entails making a solid case …

A continuous problem: Tackling the cybersecurity skills shortage
We have read the over abundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and …

Researchers develop machine learning-based detector that stops lateral phishing attacks
Lateral phishing attacks – scams targeting users from compromised email accounts within an organization – are becoming an increasing concern in the U.S. Whereas in …

50% of apps will not be migrated to the cloud
66% of businesses face difficulty in integrating and managing apps across third-party environments, while IT leaders also claim that over the next three years 50% of …

Employees know vulnerabilities exist, but they can’t resolve them quickly enough
There is a sharp remediation gap between when organizations first detect vulnerabilities and when those issues are ultimately resolved, Adaptiva survey reveals. The survey …

The digital economy is approaching a critical tipping point
As the current decade comes to an end, the digital economy is approaching a critical tipping point. By 2023, the global economy will finally reach “digital …

Europol: Spear phishing the most prevalent cyber threat affecting orgs across the EU
Spear phishing describes the practice of targeting specific individuals within an organisation or business for the purposes of distributing malware or extracting sensitive …

People are the very first element in a pragmatic cybersecurity strategy
39 percent of cybersecurity and IT executives indicate their company is under-prepared to handle a data breach and 66 percent prefer negotiating with a used car salesperson …

Organizations fail to maximize use of Microsoft 365 security features
While the majority of IT decision makers (88 percent) say they have ‘fully deployed’ Microsoft 365 in their organization, most have yet to adopt the software suite to its …

Companies should disclose cybersecurity risk management efforts
Research finds that when one company experiences a cybersecurity breach, other companies in the same field also become less attractive to investors. However, companies that …

Risky transactions on mobile devices increase 138% since 2017
Risky transactions on mobile devices are showing an increase of 138% since 2017, iovation survey of 802 consumers from the United Kingdom and 802 consumers from the United …

Together, AI and the IoT are having a bigger-than-expected impact
A survey of global business leaders reveals the most significant predictor in realizing value from Internet of Things (IoT) initiatives across an organization is the heavy use …
Featured news
Resources
Don't miss
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
- Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
- Product showcase: Go beyond VPNs and Tor with NymVPN
- CISOs must speak business to earn executive trust