Help Net Security
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/10130831/stocksnap_f7aebu9901-400x200.jpg)
Top automotive tech obstacles: Cybersecurity, software quality and functional safety
Molex announced the results of a global survey that examines the pace of innovation accelerating the development of next-generation vehicle architectures and driving …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110124/saas-400x200.jpg)
SaaS revenue declined by 46% in 2021
Software-as-a-service (SaaS) companies saw their revenue growth slow by 46% in 2021 compared to 2020, according to a study by Paddle. The result of qualitative and …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
70% of financial service providers are implementing API security
Financial service providers, such as banks and credit card companies, use a vast amount of APIs, which makes them an attractive target for threat actors. That’s why API …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
Building trust in a zero-trust environment
A recent study by MITRE and DTEX revealed that despite years of industry efforts against insider threats, there isn’t enough data – or systems advanced enough – to spot all …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
How to contain a privileged access breach and make sure it doesn’t happen again
When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
The importance of building in security during software development
Checkmarx released the UK findings of its report which found that 45% of organizations have suffered at least two security breaches as a direct result of a vulnerable …
![SSD](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095813/SSD2-400x200.jpg)
Poor data sanitization practices put public sector data at risk
A research launched by Blancco Technology Group reveals current practices and policies for device sanitization within the public sector. Researchers spoke to 596 government IT …
![medical devices](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/11091922/medical_devices_gradient-400x200.jpg)
Model contract language for medical technology cybersecurity published
Medical technology companies and health delivery organizations have a new template for agreeing on cybersecurity contractual terms and conditions to reduce cost, complexity …
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093749/cloud-money1-400x200.jpg)
Cloud computing market to reach $1,554.94 billion by 2030
The global cloud computing market is expected to reach $1,554.94 billion by 2030, registering a CAGR of 15.7%, according to ResearchAndMarkets. Cloud systems thrive at …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094609/week_in_review3-400x200.jpg)
Week in review: Linux bug gives root access to attackers, UPS devices’ vulns, IoT security for OEMs
Here’s an overview of some of last week’s most interesting news, articles and interviews: Mozilla fixes Firefox zero-days exploited in the wild (CVE-2022-26485, …
When it comes to digital banking, consumers demand security
With consumers being digitally connected in almost all facets of their lives, they expect their banks’ offerings and their payment experiences to be digital too. Entrust …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093656/delivery-packet-400x200.jpg)
Shipping fraud quickly emerging as one of the top fraud types
The continuous growth of e-commerce could be behind a surge in shipping fraud, which is now the fastest growing type of digital fraud worldwide, according to a TransUnion …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality