Help Net Security

Digital transformation initiatives: What are you doing to get ahead?
Digital transformation initiatives are more successful when they have buy-in from across the business, according to Splunk. Progress with digital business transformation …

Keys to attracting and retaining cybersecurity talent
Federal agencies need to invest strategically and heavily in their benefits strategy if they’re going to successfully compete for cybersecurity talent, according to the …

Data security disruptions can have cascading negative impacts
Nine in 10 global cybersecurity and risk experts believe that cyber risk is systemic and that simultaneous attacks on multiple companies are likely in 2017, according to AIG. …

Most companies falsely believe their Active Directory is secure
A majority of companies falsely believe their Active Directory (AD) is secure, according to a new survey conducted jointly by Skyport Systems and Redmond Magazine. The …

Cybersecurity analytics and operations: Need for automation and orchestration
New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it …

Is remote access technology leaving you vulnerable?
Insider and third-party access are growing security threats facing organizations and enterprise IT systems, according to Bomgar. Proliferation of security issues Despite …

In 5 years AI may replace pros in tasks within medicine, law and IT
CIOs have a major role to play in preparing businesses for the impact that artificial intelligence (AI) will have on business strategy and human employment. Gartner predicts …

SAP co-founder’s VC firm leads $15M investment in Vera
Vera announced a $15 million strategic investment led by HP-Ventures, the venture capital firm founded by of SAP Chairman, Hasso Plattner. Drawing from its third fund of €150 …

Defeating Magento security mechanisms: Attacks used in the real world
DefenseCode recently discovered and reported multiple stored cross-site scripting and cross-site request forgery vulnerabilities in Magento 1 and 2 which will be addressed in …

SOCs are maturing, but need more automation
Security operations centers (SOCs) are growing up, according to a new SANS survey. Respondents indicate the SOC’s primary strengths are flexibility of response and …

Viral phishing scams and vulnerabilities: What to watch out for this Patch Tuesday
I am about to head to Las Vegas for Ivanti’s Interchange 2017 at The Mirage hotel and feeling a bit in a gambling mood, so I am going to take a shot at this month’s forecast …

SharePoint houses sensitive data, but organizations are not keeping it safe
A new report from The Ponemon Institute is focused on how organizations are keeping sensitive or confidential data safe in collaboration and file sharing environments such as …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous