Help Net Security
![OT](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/26145325/ot-ics-industry-1400-400x200.jpg)
Improving OT cybersecurity remains a work in progress
Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network …
![burnout](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17141713/burnout-1500-2-400x200.webp)
Most cybersecurity pros took time off due to mental health issues
Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing …
![eBook: CISO guide to password security](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/19101110/ebook_ciso_guide_password_security-1500-400x200.webp)
eBook: CISO guide to password security
Password security has seen dramatic shifts driven by the escalation of cyber threats and technological advancements. This eBook covers: Best practices for NIST-compliant …
![SLTT whitepaper](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/19093943/sltt-whitepaper-1500-400x200.webp)
How can SLTTs defend against cyber threats?
Managing cybersecurity for any organization is no easy feat. Improving cybersecurity maturity is often even more difficult, made increasingly challenging by the eye-watering …
![cybersecurity threats](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17113455/cybersecurity_threats-400x200.webp)
Find out which cybersecurity threats organizations fear the most
This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance …
![vulnerabilities](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17143802/vulnerabilities-1500-400x200.webp)
Rising exploitation in enterprise software: Key trends for CISOs
Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. “With the NVD’s delay in associating Common …
![eBook: The Art & Science of Secure Software Development](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/18103243/secure_software_development-ebook-1500-400x200.webp)
eBook: The Art & Science of Secure Software Development
Software security requires a creative and disciplined approach. It involves having the vision to develop secure strategy, tactics, and execution. Excelling in the discipline …
![map](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17112636/map-400x200.webp)
How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams
Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps …
![CVE](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17144547/cve-blue-1500-400x200.webp)
Edge services are extremely attractive targets to attackers
The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV vulnerability trends 64% of all edge service and …
![quantum computing](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17145137/quantum_computing-1500-1-400x200.webp)
Preparing for a post-quantum future
Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27142028/genai-2-1500-400x200.webp)
42% plan to use API security for AI data protection
While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/19165750/vulnerability-1400-400x200.jpg)
Low code, high stakes: Addressing SQL injection
Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s. Due to various factors, they remain the third most common source …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege