Help Net Security
PCI Secure Software Standard 1.2 released
PCI Security Standards Council (PCI SSC) published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard …
Why automation is critical for scaling security and compliance
As companies are modernizing their tech stacks, many are unwittingly putting their business and customers at risk. Why? Because technology moves faster than teams can keep …
Leveraging the full potential of zero trust
More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …
Data protection and security in 2023
Change is the only constant. How we think about data protection, rules and regulations, and the changing of organizational structure is evolving. The good news is that …
Cybercriminals are scamming each other, tipping off law enforcement
Cybercriminals are scamming each other out of millions of dollars and use arbitration to settle disputes about the scams, according to Sophos. For this report, Sophos experts …
How IoT is changing the threat landscape for businesses
Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production …
Consumers prioritize mobile app security over features
Appdome unveiled the results of a global survey that shares the views of 25,000 consumers in 11 countries on mobile app use and consumer expectations of mobile app security. …
How compliance leaders can encourage employees to report misconduct
As Chief Compliance Officers (CCOs) continue to face challenges in restoring employee misconduct reporting to pre-pandemic levels, there are three strategies they should …
Top 7 factors boosting enterprise cybersecurity resilience
Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to the latest edition of Cisco’s annual …
Open-source tool for security engineers helps automate access reviews
ConductorOne open-sourced their identity connectors in a project called Baton, available on GitHub. Each connector gives developers the ability to extract, normalize, and …
Deal with sophisticated bot attacks: Learn, adapt, improve
A computer program known as a “bot” acts as an agent for a user or another program or mimics human action. Bots are typically used to automate particular tasks so …
7 reasons why you must embed trust into the core of your business
As organizational trust becomes a top priority for companies of all sizes and industries, a new OneTrust report highlights seven key industry trends relevant to privacy, …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month