Help Net Security
(IN)SECURE Magazine: RSAC 2022 special issue released
RSA Conference concluded its 31st annual event at the Moscone Center in San Francisco on Friday, June 10. Several of the most pressing topics discussed during this year’s …
Once is never enough: The need for continuous penetration testing
If you Google “How often should I do penetration testing?”, the first answer that pops up is “once a year.” Indeed, even industry-leading standards like PCI-DSS dictate that …
Stronger detection and automation pave the way for real-time response
Deepwatch released the State of the Modern SOC report, which found that most IT security professionals believe they could have stopped business impacting cyber events if …
Using compliance to create value for your organization
In this video for Help Net Security, Patrick Sullivan, VP of Customer Success at A-LIGN, talks about the value of modern compliance programs. As organizations work on …
SaaS security: How to avoid “death by 1000 apps”
SaaS applications have become synonymous with modern business environments, and CISOs and security teams struggle to find a happy medium between ensuring the security of their …
Only 10% of vulnerabilities are remediated each month
A research from SecurityScorecard and The Cyentia Institute revealed only 60% of organizations have improved their security posture despite a 15-fold increase in cyber-attacks …
Why do organizations need to prioritize ransomware preparedness?
Hitachi Vantara and Enterprise Strategy Group (ESG) announced the findings of a survey of more than 600 IT and cybersecurity professionals, which revealed that 79% respondents …
Strong passwords still a priority strategy for enterprises
Bitwarden announced the results of a global survey of enterprise security decision makers, conducted by 451 Research, which explores enterprise password management practices …
Metasploit 6.2.0 comes with 138 new modules, 148 enhancements and features
Metasploit is the world’s most used penetration testing framework. It helps security teams verify vulnerabilities, manage security assessments, and improve security awareness. …
83% of IT pros are using either hybrid or multi-cloud
Canonical released data from a survey revealing the goals, benefits, and challenges of cloud-native technologies. The report has surveyed more than 1,300 IT professionals over …
How organizations can protect themselves in the emerging risk landscape
In this video for Help Net Security, Ravi Srinivasan, CEO of Votiro, discusses ThoughtLab’s 2022 cybersecurity benchmarking study, Cybersecurity Solutions for a Riskier …
API security warrants its own specific solution
Application programming interfaces (APIs) enable developers to quickly and easily roll-out services but they’re also equally attractive to attackers. This is because they can …
Featured news
Resources
Don't miss
- Contextal Platform: Open-source threat detection and intelligence
- Using cognitive diversity for stronger, smarter cyber defense
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws
- Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)
- Malicious actors’ GenAI use has yet to match the hype