Help Net Security
How to avoid security blind spots when logging and monitoring
Cybersecurity involves a balancing act between risk aversion and risk tolerance. Going too far to either extreme may increase cost and complexity, or worse: cause the …
Cybersecurity skills shortage: Could training, certifications and diversity be a solution?
Fortinet released a report which reveals that the cybersecurity skills shortage continues to have multiple challenges and repercussions for organizations, including the …
55% of people rely on their memory to manage passwords
Bitwarden announced the results of its global password management survey, in advance of World Password Day on May 5th, 2022. While receptive to the importance of security, …
Week in review: Quantum Locker ransomware, most exploited vulnerabilities in 2021
Here’s an overview of some of last week’s most interesting news, articles and interviews: Meteoric attack deploys Quantum ransomware in mere hours A group wielding the Quantum …
Don’t ignore risks lurking within your own network
In this video for Help Net Security, Chris Waynforth, AVP Northern Europe at Imperva, talks about insider threats to organizations. Despite increased investment in …
Leadership and recruitment changes needed to address burnout in cybersecurity
Most organizations—across almost every industry—have been forced to implement extensive digital components to their everyday operations so they can function efficiently. With …
How IIoT solutions can optimize industrial supply chain operations
Ivanti Wavelink announced the results of a joint survey with VDC Research regarding the state of industrial supply chain operations and the adoption of Industrial Internet of …
308,000 exposed databases discovered, proper management is key
Group-IB carried out a deep dive into exposed digital assets discovered in 2021. During the research, the attack surface management team analyzed instances hosting …
Security leaders relying more heavily on MSPs amid talent crunch
The cyber skills gap is driving a significant increase in reliance on external managed service providers, according to the Neustar International Security Council (NISC). 89% …
Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements
CYTRIO released findings from additional independent research it conducted during Q1 2022 on the state of companies’ readiness to comply with the California Consumer Privacy …
Top five post-pandemic priorities for cybersecurity leaders
Info-Tech Research Group has published its annual report on the priorities for security leaders. The report looks into important security trends and the priorities that stem …
How to make DevSecOps a reality
Every AppSec leader recognizes and admits that software development is accelerating, and there’s no way their current approach is going to keep up. It is much better to …
Featured news
Resources
Don't miss
- Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)
- Product showcase: Penetration test reporting with PentestPad
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses