Help Net Security

DevSecOps is emerging as the main methodology for securing cloud-native applications
Only 8 percent of companies are securing 75 percent or more of their cloud-native applications with DevSecOps practices today, with that number jumping to 68 percent of …

ThreatConnect Platform: Security insight for sound decision-making
In this interview, Jason Spies, VP of Engineering & Chief Architect, ThreatConnect, talks about the powerful features of the ThreatConnect Platform. Oftentimes, the …

eBook: The DevOps Roadmap for Security
DevOps is concerned with uniting two particular tribes: development and operations. These tribes have seemingly competing priorities: developers value features while …

Week in review: IE zero-day, S3 bucket security, rise of RDP as a target vector
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Cybersecurity automation? Yes, wherever possible Automated systems are …

How to start achieving visibility in the cloud
As a security executive, you have a curious gig. On one hand, you’re responsible for securing your organization across multiple systems, networks, clouds, and geographies. On …

Should the National Security Council restore the cybersecurity coordinator role?
Former national security advisor John Bolton’s elimination of the cybersecurity coordinator role in May 2018 came as a surprise to many in the cybersecurity industry, …

Year-over-year malware volume increased by 64%
The most common domains attackers use to host malware and launch phishing attacks include several subdomains of legitimate sites and Content Delivery Networks (CDNs) such as …

As consumers engage with insurance companies online, new types of digital fraud emerge
As more U.S. consumers use digital platforms when engaging with insurance companies, new fraud challenges are likely to arise for insurance carriers, according to TransUnion …

The Standoff: Attackers and defenders to face off in digital metropolis security challenge
The upcoming HITB+ CyberWeek, which will take place at the Emirates Palace in Abu Dhabi on October 12–17, 2019, will see hackers and cybersecurity practitioners participate in …

Podcast: Potential problems with the software supply chain for industrial sites
Industrial security pioneer Eric Byres, CEO of aDolus, speaks to software supply chain trust issues and some of the technology his new venture aDolus Inc. is developing to …

Tackling biometric breaches, the decentralized dilemma
A recent discovery by vpnMentor revealed a worst case scenario for biometrics: a large cache of biometric data being exposed to the rest of the world. In this case web-based …

Cybersecurity breach experience strengthens CVs
It is in businesses’ best interest to hire cybersecurity leaders who have suffered an avoidable breach, because of the way it changes how security professionals think, feel …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)