Help Net Security

Security orchestration and automation checklist: How to choose the right vendor
Faced up against the well-chronicled global skills shortage, the ceaseless bombardment of security alerts and the hodgepodge of security tools unable to communicate with each …

DNS security is no longer optional
Several high-profile DNS security incidents have made headlines recently, a reminder that this integral part of the internet must not be taken for granted. Unlike enterprise …

FSI organizations are failing to assess their software for security vulnerabilities before release
More than half of organizations have experienced theft of sensitive customer data or system failure and downtime because of insecure software or technology, a Synopsys report …

The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies
On average, security personnel in U.S. enterprises waste approximately 25 percent of their time chasing false positives because security alerts or indicators of compromise …

As attackers get more creative, mobile threats and attacks increase in both quantity and impact
It is no longer a matter of if or when an enterprise’s mobile endpoints will be compromised. They already are and most organizations have little to no knowledge or visibility …

Public cloud data continues to grow, headed toward $500 billion by 2023
The worldwide public cloud services market grew 27.4% year over year in 2018 with revenues totaling nearly $183 billion, according to IDC. This growth rate, which is more than …

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial
As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware …

Week in review: Capital One breach, Visa payment limit bypass flaw, VxWorks RTOS vulnerabilities
Here’s an overview of some of last week’s most interesting news, interviews and articles: The dynamic of modern security challenges: Issues security leaders face …

Five examples of user-centered bank fraud
In today’s digital-first world, banks and financial service companies need to allow their customers to easily manage money online in order to compete. Unfortunately, most …

Research shows that devices banned by US government lack basic security practices
As the August 13 deadline looms for the US ban on Chinese surveillance cameras, the news cycle is re-engaged with the issue. The panic about banned cameras still being in …

Most interesting trends on cloud service and web usage
Cloud services account for 85% of all enterprise web traffic, signaling a need for enterprises to adopt a holistic approach to securing the cloud and web, a Netskope Cloud …

Many companies don’t know the depth of their IoT-related risk exposure
In the digital age, cyber is everywhere. Cyber risk now permeates nearly every aspect of how we live and work. Organizations should better understand how to manage the risks …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems