searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

security assessment

Get our top stories in your inbox

MVSP: A minimum cybersecurity baseline to simplify vendor security assessment

October 28, 2021

Any organization that’s actively working on managing its cybersecurity risk can’t ignore the risk that goes with third-party vendors having access to its critical …

CAM sector cybersecurity challenges and how to mitigate them

May 11, 2021

ENISA discloses an in-depth analysis of the cybersecurity challenges faced by the connected and automated mobility (CAM) sector and provides actionable recommendations to …

MythBusters: What pentesting is (and what it is not)

April 29, 2021

You’ve probably seen the term pentesting pop up in security research and articles, but do you know what it really means? Simply put, penetration testing is a security …

Third-party risk management programs still largely a checkbox exercise

February 24, 2021

Enterprise third-party risk management (TPRM) programs have been around for a half-decade or longer, and at this point most large organizations run one. However, many of these …

PCI SSC releases PCI Secure Software Lifecycle (SLC) Standard 1.1

February 23, 2021

The PCI Security Standards Council (PCI SSC) has published version 1.1 of the PCI Secure Software Lifecycle (SLC) Standard and its supporting program documentation. The PCI …

The cybersecurity issues of seismic monitoring devices

February 16, 2021

Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices …

How do I select a security assessment solution for my business?

November 18, 2020

A recent research shows high-risk vulnerabilities at 84% of companies across finance, manufacturing, IT, retail, government, telecoms and advertising. One or more hosts with a …

How security theater misses critical gaps in attack surface and what to do about it

September 16, 2020

Bruce Schneier coined the phrase security theater to describe “security measures that make people feel more secure without doing anything to actually improve their security.” …

A proactive approach to cybersecurity requires the right tools, not more tools

September 30, 2019

The key challenge facing security leaders and putting their organizations at risk of breach is misplaced confidence that the abundance of technology investments they have made …

Google introduces many G Suite security enhancements

April 15, 2019

Last week, the big news from Google Cloud Next 2019 was that phones running Android 7.0 or higher can be turned into a security key for G Suite account 2-step verification. …

Third-party cyber risk management is a burden on human and financial resources

March 28, 2019

Organizations and third parties see their third-party cyber risk management (TPCRM) practices as important but ineffective. There are four major takeaways for key decision …

Cyber preparedness essential to protect EU from large scale cyber attacks

March 19, 2019

The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable. Preparing …

Posts navigation

1 2

Featured news

  • Hijacking of popular ctx and phpass packages reveals open source security gaps
  • Sigstore: Signature verification for protection against supply chain attacks
  • Review: Hornetsecurity 365 Total Protection Enterprise Backup
Easily migrate to the cloud with CIS Hardened Images

What's new

New infosec products of the week: May 27, 2022

What is keeping automotive software developers up at night?

How to eliminate the weak link in public cloud-based multi-party computation

80% of consumers prefer ID verification when selecting online brands

Don't miss

How to eliminate the weak link in public cloud-based multi-party computation

GM, Zola customer accounts compromised through credential stuffing

Hijacking of popular ctx and phpass packages reveals open source security gaps

Sigstore: Signature verification for protection against supply chain attacks

Why are current cybersecurity incident response efforts failing?

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise