Please turn on your JavaScript for this page to function normally.
money
Making a business case for security in a world of tightening budgets

With talk of a possible recession approaching (if one isn’t already upon us), many businesses are already applying a higher level of scrutiny to spending—even for …

arrows
The key differences between a business continuity plan and a disaster recovery plan

In this Help Net Security video, Chip Gibbons, CISO at Thrive, illustrates the differences between a business continuity plan and a disaster recovery plan. While these terms …

open source
Open source projects under attack, with enterprises as the ultimate targets

Sonatype has found a massive year-over-year increase in cyberattacks aimed at open source projects. According to early data from Sonatype’s 8th annual State of the …

zero trust
Why zero trust should be the foundation of your cybersecurity ecosystem

For cybersecurity professionals, it is a huge challenge to separate the “good guys” from the “villains”. In the past, most cyberattacks could simply be traced to external …

architecture
3 ways to gauge your company’s preparedness to recover from data loss

Use these three questions to assess your company’s preparedness to retrieve lost data. 1. Do you have backups of your data? This fundamental question is the basis of …

colors
How the CIO’s relationship to IT security is changing

In this Help Net Security video, Joe Leonard, CTO at GuidePoint Security, illustrates how the role of the CIO is changing as cybersecurity priorities and responsibilities are …

project zero trust
Introducing the book: Project Zero Trust

In this Help Net Security video interview, George Finney, CSO at Southern Methodist University, talks about his latest book – “Project Zero Trust: A Story about a …

Fuzz CLI
CI Fuzz CLI: Open-source tool simplifies fuzz testing for C++

Fuzz testing helps developers protect their applications against memory corruptions, crashes that cause downtime, and other security issues, including DoS and uncaught …

phishing
Phishing attacks skyrocketing, over 1 million observed

The APWG’s Phishing Activity Trends Report reveals that in the second quarter of 2022, the APWG observed 1,097,811 total phishing attacks — the worst quarter for …

Woman working on laptop
How confident are IT pros in their tech career?

SolarWinds unveils the results of its survey examining the state of the technology job market amid industry-wide labor shortages and hiring challenges. Released to coincide …

week in review
Week in review: Revolut data breach, ManageEngine RCE flaw, free Linux security training courses

GTA 6 in-development footage leaked American video game publisher Rockstar Games has suffered an unfortunate data leak: someone has released online in-development …

cloud
How to keep public cloud data secure

Nearly two-thirds of respondents to a recent Laminar survey said they currently have data resident in the public cloud (Amazon Web Services, Microsoft Azure, or Google Cloud …

Don't miss

Cybersecurity news