Help Net Security

What you can expect at the 10th annual HITB Security Conference in The Netherlands
The tenth edition of Hack In The Box Amsterdam will soon be upon us, with interesting talks, trainings, and hacking contests. Some of the trainings have already been sold out, …

Cybercriminals are increasingly using encryption to conceal and launch attacks
In this Help Net Security podcast, Deepen Desai, VP Security Research & Operations at Zscaler, talks about the latest Zscaler Cloud Security Insight Report, which focuses …

Guilty by association: The reality of online retail third-party data leaks
Online retail activity continues to accelerate at a rampant pace and shows no signs of slowing down. According to the National Retail Federation (NRF), U.S. retail sales are …

Less than 20% of IT pros have complete access to critical data in public clouds
Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient. Lack of visibility can result in a …

Most companies help employees cover costs to obtain professional certifications
Workers today can expand their professional skills with less financial stress thanks to a majority of employers offering to cover or offset educational costs, new research …

CFOs and CIOs must collaborate on digital transformation to remain competitive
CFOs are shifting their priorities from cutting costs to rapidly investing in technology and data. Significant percentages of senior financial executives currently implement …

Secure workloads without slowing down your DevOps flows
In this Help Net Security podcast recorded at RSA Conference 2019, David Meltzer, CTO at Tripwire, and Lamar Bailey, Senior Director of Security Research at Tripwire, discuss …

Employee cybersecurity essentials part 1: Passwords and phishing
Your company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn’t mean you’re not at risk for a breach, or that – as an …

What worries you the most when responding to a cybersecurity incident?
The clock starts ticking immediately following a cybersecurity incident with the first 24 hours vital in terms of incident response. The majority (59 percent) of companies are …

Consumers willing to dump apps that collect private data, but can’t tell which are doing so
Consumers are increasingly leery of third parties using and capitalizing on their private data. Two in three consumers are willing to dump data-collecting apps if the …

2017 Cisco WebEx flaw increasingly leveraged by attackers, phishing campaigns rise
Network attacks targeting a vulnerability in the Cisco Webex Chrome extension have increased dramatically. In fact, they were the second-most common network attack, according …

The success of the digital workplace depends on the practical implementation of new technology
Medium-sized businesses now account for over 60% of US jobs, and are investing fast in technology. However, with digital now a priority for businesses of all sizes, they must …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous