searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

survey

Get our top stories in your inbox

Threat actors increasingly use third parties to run their scams

June 28, 2022

Abnormal Security released new research that showcases a rising trend in financial supply chain compromise as threat actors impersonate vendors more than ever before. In …

Properly securing APIs is becoming increasingly urgent

June 28, 2022

Imperva released a new study that uncovers the rising global costs of vulnerable or insecure APIs. The analysis of nearly 117,000 unique cybersecurity incidents estimates that …

48% of security practitioners seeing 3x increase in alerts per day

June 27, 2022

Panther Labs surveyed 400 active security practitioners, primarily, security analysts and security engineers, to reflect the “boots on the ground” perspective for security …

How companies are prioritizing infosec and compliance

June 24, 2022

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for …

Risky behavior reduced when executives put focus on identity security

June 24, 2022

Managing identities accessing enterprise resources has become significantly more complicated over the last several years. Between the increasing number of identities, the …

Despite known security issues, VPN usage continues to thrive

June 24, 2022

VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a new …

Rate of IT security incidents grows with company size

June 23, 2022

The rate of IT security incidents increases the more Microsoft 365 security features are used, according to Hornetsecurity. Organizations using Microsoft 365 and that use 1 or …

Security pros increasingly plan to adopt MDR services in the next 12 months

June 23, 2022

The managed cybersecurity services market is undergoing a significant shift, according to a new survey conducted by Osterman Research. As organizations struggle with too many …

The price of stolen info: Everything on sale on the dark web

June 22, 2022

What is the price for personal information, including credit cards and bank accounts, on the dark web? Privacy Affairs researchers concluded criminals using the dark web need …

After being breached once, many companies are likely to be hit again

June 21, 2022

Cymulate announced the results of a survey, revealing that two-thirds of companies who have been hit by cybercrime in the past year have been hit more than once, with almost …

Solution to cybersecurity skills gap largely sits with hiring practices

June 21, 2022

(ISC)² published findings from its 2022 Cybersecurity Hiring Managers research that shed light on best practices for recruiting, hiring and onboarding entry- and junior-level …

How tool sprawl is becoming a common issue for SMEs

June 20, 2022

JumpCloud announced the findings from its Q2 2022 SME IT Trends Report, revealing that while IT teams are successfully managing hybrid-remote work, they are still burdened …

Posts navigation

1 2 3 4 5 … 356

Featured news

  • Exploring the insecurity of readily available Wi-Fi networks
  • Python packages with malicious code expose secret AWS credentials
  • OT security: Helping under-resourced critical infrastructure organizations
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Researchers uncover ZuoRAT malware targeting home-office routers

Trends to watch when creating security strategy for the next two years

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Exploring the insecurity of readily available Wi-Fi networks

Don't miss

Researchers uncover ZuoRAT malware targeting home-office routers

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

Trends to watch when creating security strategy for the next two years

Python packages with malicious code expose secret AWS credentials

OT security: Helping under-resourced critical infrastructure organizations

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise