Help Net Security

Free tool for Active Directory changes monitoring
Netwrix Change Notifier for Active Directory tracks changes to Active Directory (AD) users, group memberships, OUs, permissions, and provides visibility into what’s happening …

Five emerging trends impacting the IT consulting services market
The top five emerging trends driving the global IT consulting services according to Technavio are: Adoption of environment-friendly technology Growing preference for remote …

Federal regulators: Increasing cybersecurity stance on financial institutions
Everyone is increasing the attention of cybersecurity given the continued parade of hacking incidents. Just last week, the three main prudential regulators for financial …

Best practices for securing your data in-motion
Security and compliance is at the top of every IT pro’s mind, yet much of that effort is focused on protecting data within the organization that’s “at rest.” While it’s …

Cybercrime not slowing down anytime soon
In Q3 2016, cybercriminals were increasingly more ingenious, using innovative technologies and new tools to spread their wares. This is confirmed by the 18 million new malware …

Organization face security risks due to lack of skilled cyber security experts
According to a study conducted by Dimensional Research among 500 IT security professionals, only twenty-five percent were confident their organizations have the number of …

IoT security: Defending a young industry from attack
As the IoT industry matures, it’s safe to say we’re well past “early adopter” phase and seeing broader development and deployment. While the prospect of a more established and …

Hackers changing tactics, techniques and procedures
Organizations need to conduct better penetration testing to combat continual changes in hackers’ tactics, techniques and procedures (TTPs), according to NTT Security. “Our Q3 …

SMB security: The evolving role of SaaS and IT outsourcing
SMBs need to bridge the gap between smaller IT security budgets and a shortage of expertise to face the very real and growing threat of cyber attacks, according to Kaspersky …

Study Guide: Installing and Configuring Windows Server 2012
This Study Guide covers Microsoft’s 70-410 “Installing and Configuring Windows Server 2012” exam. It’s the first exam of three exams that make up the …

Top 10 strategic predictions for IT organizations and users
Gartner revealed its top predictions for 2017 and beyond, which examine three fundamental effects of continued digital innovation: experience and engagement, business …

Week in review: DNS DDoS, Linux kernel zero-day, VeraCrypt audited
Here’s an overview of some of last week’s most interesting news, reviews and articles: Dirty COW Linux kernel zero-day exploited in the wild is now patched Linux …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?