searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

security operations

Get our top stories in your inbox

7 threat detection challenges CISOs face and what they can do about it

May 5, 2022

Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants. In fact, according to recent research, there were over 170 …

A checklist to help healthcare organizations respond to a serious cyberattack

May 4, 2022

How should organizations in the healthcare sector respond to outage due to a serious cyberattack? The Healthcare and Public Health Sector Coordinating Council’s (HSCC) …

Security teams need to become more proactive and risk-driven

November 8, 2021

83% of companies would suffer business damage during the first 24 hours of an outage and thereafter, which comes as no surprise with recent surges in ransomware and other …

Siloed security data hamper the ability to achieve collective defense

October 21, 2021

Cyware revealed a research detailing the challenges affecting modern security operations teams and the negative business impact of siloed security operations. According to the …

Combating vulnerability fatigue with automated security validation

October 4, 2021

Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two …

Automation is not here to close the cybersecurity skills shortage gap, but it can help

September 23, 2021

In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the …

Phishing attempts: Employees can be the first line of defense

September 10, 2021

33% of emails employees report as phishing attempts are either malicious or highly suspect, according to new research. The finding comes from an analysis of emails reported by …

How enterprises use security operations to modernize their business

August 30, 2021

CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and …

Fortinet plugs RCE hole in FortiManager and FortiAnalyzer (CVE-2021-32589)

July 21, 2021

A vulnerability (CVE-2021-32589) in FortiManager and FortiAnalyzer could be exploited by remote, non-authenticated attackers to execute unauthorized / malicious code as root, …

The impact of current and emerging threats on the day-to-day lives of SecOps teams

June 25, 2021

More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. …

New tool allows organizations to customize their ATT&CK database

June 23, 2021

MITRE Engenuity has released ATT&CK Workbench, an open source tool that allows organizations to customize their local instance of the MITRE ATT&CK database of cyber …

SOC burnout is real: 3 preventative steps every CISO must take

June 23, 2021

Consider this scenario: Morgan, a level 3 security analyst, arrives to a twelve-hour security operations center (SOC) shift and finds a message that a network sensor is …

Posts navigation

1 2 3 4 5 … 7

Featured news

  • Taking the right approach to data extortion
  • You should be able to trust organizations that handle your personal data
  • VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)
Easily migrate to the cloud with CIS Hardened Images

What's new

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

Vishing cases reach all time high

Paying the ransom is not a good recovery strategy

Don't miss

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

You should be able to trust organizations that handle your personal data

3 key elements to protect a Kubernetes cluster

Ransomware still winning: Average ransom demand jumped by 45%

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise