Help Net Security

Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies
Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and …

Many are seeing the damage of cybercrime and identity theft firsthand
As massive data breaches continue to make international headlines and the Internet is an integral part of our daily lives, consumers are now grasping the risks they face. In a …

IoT cyberattacks are the new normal, the security mindset isn’t
Eight in ten organizations have experienced a cyberattack on their IoT devices in the past 12 months, according to new research by Irdeto. Of those organizations, 90% …

Structural integrity: Quantifying risk with security measurement
In my previous post, we set up the foundation for a risk quantification program. Many organizations have begun this part of their security strategy and are learning how to …

SD-WAN alone cannot address the networking challenges of digital business
Enterprise IT professionals are turning to managed services for their SD-WAN deployments. At the same time, a new Cato Networks survey finds legacy telco services inadequately …

Network automation market expected to grow to $16.9 billion by 2022
According to market research by MarketsandMarkets, the network automation market size is expected to grow from $2.3 billion in 2017 to $16.9 billion by 2022, at a Compound …

Handle personal data: What we forget is as important as what we remember
This spring, Facebook addressed the issue of permanence across its messaging platforms – from Instagram to Messenger to WhatsApp – with the aim to “set a new standard” for …

How to diminish the great threat of legacy apps
The Equifax breach underscored the risk posed by unpatched software applications. As a refresher, 146 million customer records were exposed after a known vulnerability in …

Most global workers noticed stricter policies at work as a result of GDPR
When enforcement of the GDPR went into effect on May 25, 2018, it had worldwide implications on data protection and privacy legislation. One year later, there are conflicting …

Volume and quality of training data are the largest barriers to applying machine learning
IDC predicts worldwide spending on artificial intelligence (AI) systems will reach $35.8 billion in 2019, and 84% of enterprises believe investing in AI will lead to greater …

How many adults trust companies with their personal data?
More than one third (36%) of adults aged 16–75 trust companies and organizations with their personal data more since GDPR came into effect one year ago, according to TrustArc. …

Week in review: BlueKeep vulnerability, preventing Google account takeovers
Here’s an overview of some of last week’s most interesting news and articles: Data privacy: A hot-button issue for Americans one year after GDPR In recognition of …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it