Help Net Security
![calculator](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104745/calculator-400x200.jpg)
Organizations are losing cyber insurance as an important risk management tool
The number of organizations that will be either unable to afford cyber insurance, be declined cover, or experience significant coverage limitations is set to double in 2023, …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
IoT: The huge cybersecurity blind spot that’s costing millions
In many ways, IoT has made our lives easier. We are technologically connected in ways we never thought possible. But organizations need to be aware of the cybersecurity blind …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100033/industrial-400x200.jpg)
Why smart factories need to prioritize cybersecurity
Recent Capgemini research revealed that the vast majority of organizations do not have device visibility at their smart factory locations. The use of legacy machinery, …
![Dan Tucker](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/17145844/dan_tucker-2-booz_allen_hamilton-400x200.jpg)
How government CISOs tackle digital transformation initiatives
In this interview for Help Net Security, Dan Tucker, Senior VP at Booz Allen, and leader of the firm’s cloud and data engineering solutions for citizen services, talks about …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
The factors driving today’s accelerated zero trust adoption
Zero trust has quickly progressed from a buzzword to a critical business imperative, Okta’s 2022 State of Zero Trust Security Report has found. Today, 97% of businesses say …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Identity crimes reach all-time high
The Identity Theft Resource Center (ITRC) has published a report that looks at the identity crimes committed against individuals as reported by the victims of those crimes. In …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Incident response in the cloud can be simple if you are prepared
If your business has moved toward off-premises computing, there’s a bonus to the flexibility and scalability services that AWS and Microsoft 365 can provide. Incident response …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104753/iot-1-400x200.jpg)
How attackers are exploiting corporate IoT
In this Help Net Security video, Brian Contos, CSO at Phosphorus Cybersecurity, discusses how most companies consider IoT threats to be limited in scope. In actuality, a …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
What is challenging successful DevSecOps adoption?
Mezmo published an ESG report which provides insights on DevSecOps adoption, its benefits, and the challenges with implementation. According to the study, only 22% of …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093937/email-400x200.jpg)
Response-based attacks make up 41% of all email-based scams
Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, …
![Android 13](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/16110458/android-13-security-password-400x200.jpg)
Google releases Android 13 with improved privacy and security features
Google released Android 13, and it is already rolling out to eligible Pixel smartphones. In this Help Net Security video, you’ll learn more about the latest privacy and …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/11111202/lock-400x200.jpg)
Overcoming the roadblocks to passwordless authentication
It’s a well-known fact that humans are the weakest link in any security strategy. Verizon’s latest annual data breach report found that over 80% of breaches in the “Basic Web …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality