Help Net Security
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27090527/ransomware-yellow-400x200.jpg)
Holidays don’t mean much to ransomware attackers
Cybereason published a global study of 1,200+ security professionals at organizations that have previously suffered a successful ransomware attack on a holiday or weekend. The …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Fraud fighters aren’t prepared for the multi-billion dollar threat of global insurance fraud
Nearly 60% of those tasked with thwarting the multi-billion dollar threat posed by global crime rings are not yet up to the task, reports a study by the Coalition Against …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
IoT security market to reach $52.3 billion by 2026
The overall security in IoT market will reach $52.3 billion globally by 2026, while distributed denial of service protection for IoT systems will reach $1.58 globally by 2026, …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
eBook: Using NIST guidelines for secure passwords
Designing and implementing a password policy that responds directly to NIST guidelines is a crucial step in locking down your company’s security. Enzoic for Active …
![syringe](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094039/syringe2-400x200.jpg)
Top 5 cybersecurity considerations for file uploads of vaccination records
As vaccination mandates become more common, immunization records are increasingly required across the world. Organizations are turning to the digital space to upload images of …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110509/usa-flag-1-400x200.jpg)
An introduction to U.S. data compliance laws
Due to technological advances like the rise of cloud storage and social media, there is an increasing concern over privacy — especially when it comes to how businesses collect …
![online marketplace](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/07094402/secure_online_marketplace-400x200.jpg)
As digital shopping surges, researchers predict 8 million daily attacks
Arkose Labs released new data on the latest fraud trends, revealing increased threats during the holidays, rising bot attacks, and a resurgence in attacks on travel companies. …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Ethical hackers and the economics of security research
Bugcrowd released a report which provides CIOs and CISOs valuable insight on ethical hackers and the economics of security research. New findings indicate a startling shift in …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095949/tunnel-400x200.jpg)
Businesses compromise on cybersecurity in favor of other goals
90% of IT decision makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals. Additionally, …
![quantum](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104847/quantum-400x200.jpg)
The CIS Benchmarks community consensus process
The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security guidance. The first CIS …
![RSA Security Analytics](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194626/rsa-security-analytics-400x200.jpg)
Security analytics market to reach $25.4 billion by 2026
The global security analytics market is projected to grow from $12 billion in 2021 to $25.4 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 16.2% during the …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094609/week_in_review3-400x200.jpg)
Week in review: Intel chip flaw, shedding light on hidden root CAs, Emotet stages a comeback
Here’s an overview of some of last week’s most interesting news, articles and interviews: Researchers shed light on hidden root CAs How widespread is the use of …
Featured news
Sponsored
Don't miss
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization