Help Net Security
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203448/data_analytics2-400x200.jpg)
IT leaders think immutable data storage is an insurance policy against ransomware
IT leaders consider immutable storage as a must-have in the fight against cyberattacks, according to Scality. Ransomware threats are now understood by organizations to be …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27110446/insider-threat-1500-400x200.webp)
The most concerning risks for 2024 and beyond
In this Help Net Security video, Melissa Bischoping, Director, Endpoint Security Research at Tanium, discusses the most concerning risks for 2024 and beyond, from both an …
![Nudge Security](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11132253/nudge-1500-400x200.webp)
Product showcase: How to track SaaS security best practices with Nudge Security
As technology adoption has shifted to be employee-led, IT and security teams are contending with an ever-expanding SaaS attack surface. At the same time, they are often spread …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11083747/malware-1500-400x200.webp)
Keyloggers, spyware, and stealers dominate SMB malware detections
In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers …
![Eye](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/07114030/eye-1500-400x200.webp)
How advances in AI are impacting business cybersecurity
While ChatGPT and Bard have proven to be valuable tools for developers, marketers, and consumers, they also carry the risk of unintentionally exposing sensitive and …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28200051/privacy-man-400x200.jpg)
How organizations can keep up with shifting data privacy regulations
With no sign of regulations slowing down, enterprises struggle to keep pace with the rapid changes. According to a recent NTT Data survey of business executives, 3 in 4 …
![QR code](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09155644/qrcode-1400-400x200.jpg)
Image-based phishing tactics evolve
While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, …
![free cybersecurity guides](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/10120052/free_cybersecurity_guides-1500-400x200.webp)
10 free cybersecurity guides you might have missed
This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153422/email3-400x200.jpg)
Email security trends in the energy and infrastructure sector
In this Help Net Security video, Mike Britton, CISO at Abnormal Security, discusses how energy and infrastructure organizations face an increased risk of business email …
![email overload](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/11141504/data-overload-1400-400x200.jpg)
Advanced AI, analytics, and automation are vital to tackle tech stack complexity
97% of technology leaders find traditional AIOps models are unable to tackle the data overload, according to Dynatrace. Organizations are drowning in data The research reveals …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16162224/insider_threat-1400-400x200.jpg)
Insider threats can damage even the most secure organizations
Insider threats encompass both intentional and unintentional actions. Some insiders may maliciously exploit their access for personal gain, espionage, or sabotage, while …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184227/week-in-review-400x200.jpg)
Week in review: Attackers use phishing emails to steal NTLM hashes, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What organizations need to know about the Digital Operational Resilience Act …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints