Help Net Security

Product showcase: Veriato Cerebral user & entity behavior analytics software
When it comes to identifying and stopping insider data security threats, actionable insights into people’s behaviors are invaluable. Employees involved in negative workplace …

How can we improve adoption and ROI on security investments?
Traditionally, whenever employees are required to interact with security solutions, they push back because they don’t want their lives to be made more complicated with extra …

Zero Trust browsing: Protect your organization from its own users
To the casual observer, the cyberattack landscape is constantly shifting. In recent years, the threats and scams have evolved from Nigerian princes to stranded travelers, …

There’s a growing disconnect between data privacy expectations and reality
There is a growing disconnect between how companies capitalize on customer data and how consumers expect their data to be used, according to a global online survey …

Average DDoS attack volumes grew by 194% in 12 months
The volume and complexity of DDoS attacks continued to grow in Europe during the final quarter of 2018, according to Link11. While Link11’s Security Operations Center (LSOC) …

Week in review: Vaporworms, 8 months of GDPR, penetration testing effectiveness
Here’s an overview of some of last week’s most interesting news and articles: Why vaporworms might be the scourge of 2019 Not too long ago, the WatchGuard Threat …

Mild to medium volume expected for February 2019 Patch Tuesday
If you look at the recent Patch Tuesday lineups, we have seen the usual updates for the Microsoft Windows OS, browsers, and Office. In the last two months we have seen updates …

DevOps and DevSecOps developments to watch in 2019
Some predictions are more accurate than others. Last year, I was sure that serverless would finally overtake containers—but then 2018 turned out to be the year of Kubernetes. …

Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption
65 percent of infosecurity professionals would like to store object data in the cloud, but 47 percent either don’t believe or are not sure if data in the cloud is as …

What do successful pentesting attacks have in common?
In external penetration testing undertaken for corporate clients in industrial, financial, and transport verticals in 2018, Positive Technologies found that, at the vast …

Lookalike domains: Artificial intelligence may come to the rescue
In the world of network security, hackers often use lookalike domains to trick users to unintended and unwanted web sites, to deliver malicious software into or to send data …

5 reasons why asset management is a hot topic
Sometimes buzzwords are good predictors of what organizations see as priorities in a given year. If you surveyed both the revenue-generating and security functions of …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated