Help Net Security

Global spending on digital transformation to reach $1.18 trillion in 2019
Enterprises around the world are making significant investments in the technologies and services that enable the digital transformation (DX) of their business models, products …

Cybercriminals are becoming more methodical and adaptive
Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations …

You can’t fix what you can’t see: A new way of looking at network performance
Network performance, or the service quality of a business’ network, is critical to running a successful enterprise. Imagine the cost to an organization when the corporate …

Employers should develop cybersecurity protocols and invest more in employee training programs
Organizations want to trust their employees when it comes to cybersecurity, but to do so, they need to better leverage technology. The ObserveIT global survey of 600 IT …

Researchers develop new tool for safety-critical software testing
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the National Institute …

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry
The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable …

Where data privacy executives plan to focus their strategies and budgets
Adapting to an increasingly volatile regulatory environment is the top priority for privacy executives, with only approximately four in 10 confident in their current abilities …

Nearly half of firms suffer data breaches at hands of vendors
As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to …

A casual approach to workplace communications presents major security risks
Workers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their …

Research on private key generation reveals theft of ETH funds from accounts with discoverable keys
Researchers at Independent Security Evaluators (ISE) have discovered 732 actively used private keys on the Ethereum blockchain. In their new study titled Ethercombing, ISE …

Whitepaper: Third-Party Risk to the Nth Degree
For many, cost-effective scalability usually means outsourcing some or all of your business functions to a complex web of third-party vendors. The Third-Party Risk to the Nth …

The foundation: Quantifying risk with focused security measurement
When you hear “quantify risk,” you might think it’s the buzz-term du jour. You might be right. Risk quantification is a hot topic right now. It seems everyone who touches …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems