searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

security controls

Get our top stories in your inbox

The benefit of adopting a hacker mindset for building security strategies

December 21, 2022

As VP of Research at Pentera, Alex Spivakovsky leads a team of former pen-testers, red-teamers, and incident response experts whose job is to bypass existing security …

Don’t ignore the security risks of limitless cloud data

December 2, 2022

Over the past two decades, technology has evolved to make it easy and affordable for companies to collect, store and use massive amounts of data. From AWS to Google Cloud to …

Compliance initiatives can advance your organization’s security journey

November 10, 2022

Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at …

The various ways ransomware impacts your organization

September 27, 2022

Despite increased investment in tools to fight ransomware, 90% of organizations were affected by ransomware in some capacity over the past 12 months, according to …

Companies spending $6M on ransomware mitigation: Is it working?

February 25, 2022

A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation …

Building confidence in your system’s security with chaos engineering

February 3, 2022

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient …

API security: Understanding the next top attack vector

January 5, 2022

Application Programming Interfaces (APIs) underpin today’s digital ecosystem as the essential connective tissue that allows companies to exchange data and information quickly …

Ransomware and terrorism: For security pros the threat is equal

December 30, 2021

Venafi announced the findings of a global survey of more than 1,500 IT security decision makers that reveals that 60% of security professionals believe ransomware threats …

Control failures are behind a growing number of cybersecurity incidents

December 1, 2021

Data from a survey of 1,200 enterprise security leaders reveals that an increase in tools and manual reporting combined with control failures are contributing to the success …

80% of organizations experienced employees misusing and abusing access to business apps

November 8, 2021

Organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats …

The first step to being cybersmart: Just start somewhere

October 26, 2021

When it comes to a subject as complex as cybersecurity, it’s easy to become a victim of decision paralysis. When company leaders and IT staff begin looking at their options …

Five proven techniques for building effective fraud management

October 5, 2021

Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association of Certified Fraud Examiners’ …

Posts navigation

1 2 3

Featured news

  • As the anti-money laundering perimeter expands, who needs to be compliant, and how?
  • The future of vulnerability management and patch compliance
  • Attackers used malicious “verified” OAuth apps to infiltrate organizations’ O365 email accounts
Guide: How virtual CISOs can efficiently extend their services into compliance readiness

Sponsored

eBook: 4 ways to secure passwords, avoid corporate account takeover

Here’s the deal: Uptycs for all of 2023 for $1

2022 Cloud Data Security Report

Don't miss

Video walkthrough: Cybertech Tel Aviv 2023

Photos: Cybertech Tel Aviv 2023

As the anti-money laundering perimeter expands, who needs to be compliant, and how?

The future of vulnerability management and patch compliance

Attackers used malicious “verified” OAuth apps to infiltrate organizations’ O365 email accounts

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us