Help Net Security

A network is only as strong as its weakest shard
Blockchain, a nascent technology, has enterprises globally enamored with the promise it holds to fundamentally turn everything from how we interact, transact, store, and …

Unsurprisingly, only 14% of companies are compliant with CCPA
With less than 10 months before the California Consumer Privacy Act (CCPA) goes into effect, only 14% of companies are compliant with CCPA and 44% have not yet started the …

Fewer than 28% of gov.uk using DMARC effectively in line with guidelines
Only 28% of gov.uk domains have been proactive in setting up DMARC appropriately, in line with UK Government Digital Service (GDS) advice in preparation for the retirement of …

Denial of Service vulnerability discovered in Triconex TriStation Software Suite Emulator
Applied Risk ICS Security Consultant Tom Westenberg discovered a DoS vulnerability in an emulated version of the Triconex TriStation Software Suite. Triconex is a Schneider …

(ISC)² brings its Secure Summit to The Hague
Supporting its membership and the wider sector with continuous education opportunities is a major part of what (ISC)2 does as a membership organisation for certified …

The art of securing ERP applications: Protecting your critical business processes
In this Help Net Security podcast recorded at RSA Conference 2019, Juan Pablo Perez-Etchegoyen, CTO at Onapsis talks about the challenges of securing and monitoring ERP …

Four key security tips when using any collaboration technology
With database breaches and ransomware attacks making daily news, security is now a top priority for companies, and collaboration solutions are no exception. In the current age …

Tax season scaries: How to keep your data safe from insider threats
With April 15 quickly approaching, companies across the country are rushing to get their taxes filed. This often requires third party specialists who are well-versed in …

Cyber preparedness essential to protect EU from large scale cyber attacks
The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable. Preparing …

Latest trends in automated threat intelligence-driven network security
Since the earliest days of the Internet both network threats and network defenses have been evolving. In this Help Net Security podcast recorded at RSA Conference 2019, Todd …

Meet the new generation of white hats
The past two years have seen an explosion in the number of software vulnerabilities being published, jumping from 6,447 in 2016 to 14,714 in 2017. Seeing as 2018 beat out the …

Current phishing defense strategies and execution are not hitting the mark
Few professionals are completely confident in their ability to assess the effectiveness of their phishing awareness efforts. In a new paper, Phishing Defense and Governance, …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised