Help Net Security
Organizations remain ill-prepared for ransomware attacks
A Zerto study – conducted by ESG – shows that ransomware attacks remain a major concern for organizations. In fact, nearly three-quarters of organizations …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
What’s a vCISO and why does your company need one?
In this video for Help Net Security, Jeff Hoskins, vCISO at BARR Advisory, explains the concept of a vCISO, which stands for virtual chief information security officer, and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093341/crypto-coin-400x200.jpg)
Crypto-related phishing and how to avoid it
In this video for Help Net Security, Michael Aminov, Chief Architect at Perception Point, talks about a recent Binance impersonation attack and, more broadly, the ongoing …
![Law legislation](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113340/law-400x200.jpg)
The evolving role of the lawyer in cybersecurity
Cybersecurity is one of the most dynamic fields of law. Long gone are the days when organizations could rely entirely on defensive measures within their own environments for …
![Keeper Security](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/12100645/keeper-security-enterprise-400x200.jpg)
Product Showcase: Keeper Security’s Enterprise Password Management platform
People often speak of cybersecurity as a technology challenge. But protecting data and IT infrastructure is also very much a matter of human behavior. Eighty-five percent of …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/12075527/ransomware-hands-400x200.jpg)
How ready are organizations to manage and recover from a ransomware attack?
Zerto announced the findings of a ransomware study, revealing that gaps in readiness are seriously impacting the ability of many organizations to manage and recover from …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094408/cloud2-400x200.jpg)
IT leaders require deeper security insights to confidently manage multi-cloud workloads
Gigamon released recent findings from a Pulse.qa study which surveyed IT and InfoSec leaders to identify challenges associated with advancing their multi-cloud strategies. …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/06180713/open_source_cloud-hns-400x200.jpg)
Challenges development teams face when building applications with open source
Tidelift released a report providing critical insights into the state and practice of open source software supply chain management. This comprehensive study of nearly 700 …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
Digital ID verification: Using a mobile device to prove your identity
It’s important to understand that passwords are not passports. Using biometrics, which is a great security advancement, is not the same as identity, says Leonard …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Moving towards defense in depth under the gray skies of conflict
The war in Ukraine is in the second month of bloodshed and the broader impact of the conflict is being felt across the globe, as markets react to increased fuel prices and the …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13131647/lock-data-400x200.jpg)
The state of coordinated vulnerability disclosure policies in EU
The European Union Agency for Cybersecurity (ENISA) publishes a map of national coordinated vulnerability disclosure (CVD) policies in the EU Member States and makes …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/06144957/open-source-code-hns-400x200.jpg)
81% of codebases contain known open source vulnerabilities
Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality