Help Net Security
![location tracking](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29221945/location-tracking-1-1500-400x200.webp)
Location tracking and the battle for digital privacy
While some online privacy issues can be subtle and difficult to understand, location tracking is very simple – and very scary. Perhaps nothing reveals more about who we are …
![human risk](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29221250/human-risk-400x200.webp)
Human risk is the top cyber threat for IT teams
After another year rife with cybercrime, IT and cyber leaders are confronted with a new reality. AI and deepfakes can trick even the most well-trained employee, and executing …
![ID](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29224543/identification-id-1-1500-400x200.webp)
What the ID of tomorrow may look like
Few joys remain untouched by the necessity of identity verification. With its ubiquitous presence, the call for heightened security, improved accessibility, and seamless …
![AI forensics](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29221650/ai-forensics-400x200.webp)
Why AI forensics matters now
In this Help Net Security video, Sylvia Acevedo, who serves on the Boards of Qualcomm and Credo, discusses why companies should invest in forensic capabilities and why …
![teamwork](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09153009/teamwork-cybersecurity-400x200.jpg)
73% brace for cybersecurity impact on business in the next year or two
Only 3% of organizations across the globe have the ‘mature’ level of readiness needed to be resilient against modern cybersecurity risks, according to Cisco. The 2024 Cisco …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/21083823/software-1500-400x200.webp)
6 keys to navigating security and app development team tensions
There will always be a natural tension between cybersecurity teams and developers. After all, it’s the developer’s role to “develop.” They want and are …
![security](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27150233/security-1600-400x200.webp)
How to design and deliver an effective cybersecurity exercise
Armed forces have always utilized war-gaming exercises for battlefield training to prepare for times of conflict. With today’s digital transformation, the same concept is …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25121802/malware-computer-2-1500-400x200.webp)
Escalating malware tactics drive global cybercrime epidemic
Evasive, basic, and encrypted malware all increased in Q4 2023, fueling a rise in total malware, according to WatchGuard. Threat actors employ diverse tactics The average …
![data privacy](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/24123138/data-privacy-1500-400x200.webp)
Securing privacy in the face of expanding data volumes
One of the primary concerns regarding data privacy is the potential for breaches and unauthorized access. Whether it’s financial records, medical histories, or personal …
![Infosec products of the month](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/28092100/infosec-month-1200-400x200.webp)
Infosec products of the month: March 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, AuditBoard, Bedrock Security, Check Point, CyberArk, Cynerio, DataDome, …
![cybersecurity week in review](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25124832/cybersecurity-week-review-2-1500-400x200.webp)
Week in review: Backdoor found in XZ utilities, weaponized iMessages, Exchange servers at risk
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: XZ Utils backdoor update: Which Linux distros are affected and what can you …
![digital identity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20132920/digital_identity1-400x200.jpg)
How much does cloud-based identity expand your attack surface?
We all know using a cloud-based identity provider (IdP) expands your attack surface, but just how big does that attack surface get? And can we even know for sure? As Michael …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints