Help Net Security

Enterprises are struggling with cloud complexity and security
The rush to digital transformation is putting sensitive data at risk for organizations worldwide according to the 2019 Thales Data Threat Report – Global Edition with research …

The biggest cybersecurity challenge? Communicating threats internally
IT executives responsible for cybersecurity feel a lack of support from company leaders, and 33 percent feel completely isolated in their role, according to Trend Micro. IT …

$1.7 billion in cryptocurrency was stolen and scammed in 2018
$1.7 billion in cryptocurrency was stolen and scammed in 2018 — a dramatic rise in criminal activity despite a slump in the market, according to CipherTrace. Criminals need to …

Exploring opportunities for infosec pros to use their skills to fight for social change
RSA Conference has teamed up with cybersecurity expert Bruce Schneier and the Ford Foundation to host the first full-day Public Interest Technologist Track, Bridging the Gap: …

How privacy and security concerns affect password practices
Yubico announced the results of the company’s 2019 State of Password and Authentication Security Behaviors Report, conducted by the Ponemon Institute, who surveyed 1,761 IT …

Global IT spending to reach $3.8 trillion in 2019, up 3.2% from 2018
Worldwide IT spending is projected to total $3.76 trillion in 2019, an increase of 3.2 percent from 2018, according to the latest forecast by Gartner. Worldwide IT spending …

What steps consumers need to take to protect themselves online
Yesterday was Data Privacy Day, so McAfee warned consumers that cybercriminals are continuing to access personal information through weak passwords, phishing emails, connected …

ENISA outlines top cyber threats and trends in 2018
In 2018, the cyber threat landscape changed significantly. The most important threat agent groups, namely cyber-criminals and state-sponsored actors have further advanced …

How to know when you’re ready for a fractional CISO
Many companies eventually find themselves in the following situation: they’re growing, their technology, infrastructure and teams are expanding, perhaps a M&A is on the …

How accepting that your network will get hacked will help you develop a plan to recover faster
As anyone in the network security world will tell you, it is an extremely intense and stressful job to protect the corporate network from ever-evolving security threats. For a …

Webinar: Automate compliance audits without the staff
With so many consequential data breaches in the past decade, data security and privacy are top of mind issues for security leaders and corporate boards. Numerous government …

Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience
Here’s an overview of some of last week’s most interesting news and articles: Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution A …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)