Help Net Security
![tunnel light](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111058/tunnel-light-400x200.jpg)
Illuminating the path: Compliance as the key to security-by-design
Like taxes or going to the dentist, compliance is one of those topics that people often don’t like to contemplate. There are many reasons for the distaste but this …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102515/fire-400x200.jpeg)
Combating cybercrime: Lessons from a CIO and Marine veteran
A colleague asked me recently if I thought the FBI had finally experienced enough of the cyberattacks plaguing the United States and would now more aggressively pursue the …
![online gaming](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110318/online_gaming-400x200.jpg)
76% of gamers were financially affected by a cyberattack, losing $700+ on average
NortonLifeLock published the findings of a global study that sheds light on the cyber risks impacting the gaming community. The survey, conducted by The Harris Poll among more …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
What is challenging secure application development?
A Censuswide report reveals the biggest security challenges that application security (AppSec) managers and software developers are facing within their organizations in …
![paint](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194421/paint-400x200.jpg)
Businesses are forced to adopt new cybersecurity measures
Eighty five percent of US and UK employers were forced to adopt new cybersecurity measures because of the COVID-19 pandemic and the shift to remote working, according to a …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
Digital transformation spending to reach $2.8 trillion in 2025
Global spending on the digital transformation (DX) of business practices, products, and organizations is forecast to reach $2.8 trillion in 2025, more than double the amount …
![Zoom](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/09141444/zoom-hands-bkg-400x200.jpg)
Zoom patches vulnerabilities in its range of conferencing apps
Zoom has patched vulnerabilities in its range of local solutions for conferences, negotiations and recordings – Zoom Meeting Connector Controller, Zoom Virtual Room …
![see](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100214/see-400x200.jpg)
We need a Cyber Awareness Century
For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135226/zero-number-1-400x200.jpg)
Operational technology and zero trust
Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …
![finance](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095930/finance-400x200.jpg)
Shrinking cyber budgets are leaving businesses at risk
The cyber budgets of enterprises rose by less than 1% during the pandemic, according to their cyber budget holders. This left cyber spend stagnating at an average of around …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095907/industry-mirror-400x200.jpg)
Cultural divide between IT and OT teams leaves 65% of organizations unable to secure both environments
Only 21% of organizations have achieved full maturity of their ICS/OT cybersecurity program, in which emerging threats drive priority actions and C-level executives and the …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
Internal audit leaders expect new risks to emerge post-pandemic
COVID-19 stretched organizational resources and unleashed new risks on a global basis, prompting an ongoing pivot by internal audit departments to address the evolving …
Featured news
Sponsored
Don't miss
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization