Help Net Security
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113147/job_hunt-400x200.jpg)
The Great Resignation meets the Great Exfiltration: How to securely offboard security personnel
“The Great Resignation” is a phenomenon that has greatly impacted how we work. As of August 2021, 65% of people in the United States were looking for a new job and 25% of them …
![PCI DSS](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102031/pci_dss-400x200.jpg)
PCI DSS 4.0: Meeting the evolving security needs of the payments industry
In this video for Help Net Security, Sean Smith, Practice Manager, PCI Advisory Services at Optiv, discusses the new PCI DSS 4.0 requirements. At the end of March 2022, the …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02103956/back-up-data-400x200.jpg)
Backup is key for cyber recovery
Granular and air-gapped backup are critical to data recovery, when, not if, a business falls victim to ransomware. Those are among the key takeaways from an Enterprise …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
New threat groups and malware families emerging
Mandiant announced the findings of an annual report that provides timely data and insights based on frontline investigations and remediations of high-impact cyber attacks …
Ransomware in fintech: Cybercriminals adopt new means as theft gives way to sabotage
VMware released a report which takes the pulse of the financial industry’s top CISOs and security leaders on the changing behavior of cybercriminal cartels and the defensive …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/03132545/opensource-400x200.jpg)
The state of open-source software supply chain security in 2022
In this video for Help Net Security, Donald Fischer, CEO at Tidelift, talks about the state of open-source software supply chain security in 2022. Open source is the modern …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100133/shark-400x200.jpg)
Vulnerabilities that kept security leaders busy in Q1 2022
In this video for Help Net Security, Yotam Perkal, VP of Research at Rezilion, talks about the most critical vulnerabilities published during Q1 2022, and the relevant …
![thief](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095826/thief-400x200.jpg)
Slow deployment is hampering fraud prevention. What gives?
In May, Okta finalized its acquisition of Auth0 for $6.5 billion. Every company loves to add a shiny new toy to its arsenal, but this move sent a clear message to enterprise …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13142728/bomb-clock-time-400x200.jpg)
How fast do cybercriminals capitalize on new security weaknesses?
Threat intelligence analysts at Skybox Research Lab uncovered a 42% increase in new ransomware programs targeting known vulnerabilities in 2021. The report revealed how …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113326/vault-400x200.jpg)
Financial leaders grappling with more aggressive and sophisticated attack methods
VMware released a report which takes the pulse of the financial industry’s top CISOs and security leaders on the changing behavior of cybercriminal cartels and the defensive …
![snake, threat](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/21113121/snake-coiled-400x200.jpg)
Strengthening the ability of public companies to combat cybersecurity threats
The National Association of Corporate Directors (NACD), SecurityScorecard and the Cyber Threat Alliance released a report that examines the U.S. Securities and Exchange …
![BYOD](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110841/byod-400x200.jpg)
60% of BYOD companies face serious security risks
When employees began bringing shiny, new smartphones into the office in the late 2000s, many business and IT leaders spotted an opportunity. They recognized the …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality