Help Net Security
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
There is no good digital transformation without cybersecurity
Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. …
![endpoint protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/23100505/endpoint-protection-400x200.jpg)
HP Wolf Security: A new breed of endpoint protection
Millions of employees are now working from home or in a hybrid setting. Unfortunately for cybersecurity, hackers aren’t confined to office walls. It’s time for your security …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093155/ransomware-400x200.jpg)
Ransomware attacks still the #1 threat to businesses and organizations
In 2021, ransomware attacks continued to be one of the most prominent threats targeting businesses and organizations worldwide. High-profile attacks disrupted operations of …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114037/mobile_devices4-400x200.jpg)
$39.5 billion lost to phone scams in last year
Truecaller announced a research conducted in partnership with The Harris Poll in March of 2022, and the findings detail trends/insights on the impact of spam and phone scams …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094714/compliance-400x200.jpg)
Moving toward a more adaptable and tech-driven compliance function
A growing global regulatory focus on consumer privacy and data protection, along with new sustainability measurement and reporting laws is furthering the importance of …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: Account pre-hijacking, Sigstore, ransomware still winning
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RansomHouse: Bug bounty hunters gone rogue? A new cybercrime outfit that …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093801/cloud-drive2-400x200.jpg)
How to eliminate the weak link in public cloud-based multi-party computation
Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102214/connected-car-400x200.jpg)
What is keeping automotive software developers up at night?
Perforce Software released the results of its annual State of Automotive Software Development survey conducted in partnership with Automotive IQ. Close to 600 automotive …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094843/person-400x200.jpg)
80% of consumers prefer ID verification when selecting online brands
Jumio released the findings of its global research conducted by Opinium, which shows the impact of the increasing use of digital identity on consumer preferences and …
![package](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/25171705/package-danger-hns-400x200.jpg)
Hijacking of popular ctx and phpass packages reveals open source security gaps
The Python module “ctx” and a fork of the PHP library “phpass” have recently been modified by an unknown attacker to grab AWS credentials/keys and send …
When it comes to remote work, 71% of IT leaders say security is the main challenge
Workspot announced a survey report which reveals that in the past year, due to remote work, 83% of IT leaders expanded or accelerated their cloud strategies, while still …
![Sigstore](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/24142013/sigstore-hns-400x200.jpg)
Sigstore: Signature verification for protection against supply chain attacks
Software supply chain attacks have been increasing over the past few years, spurring the Biden administration to release an executive order detailing what government agencies …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality