Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
endpoint protection
Why EDR is not sufficient to protect your organization

Endpoint detection and response (EDR) tools are a cornerstone of most cybersecurity defenses today. But while the technology has an important role to play in investigating …

Kubernetes
How prepared are organizations to face a ransomware attack on Kubernetes?

Veritas Technologies announced the results of a new study revealing that the majority of organizations are underprepared to face threats against their Kubernetes environments. …

bot
Top 5 myths businesses believe about bots

Netacea announced the results from a new report showing that most businesses do not fully understand the threat bots pose, leaving those organizations vulnerable to threats. …

Cloud
The problem with multiple cloud security tools: Alert fatigue and burnout

Orca Security released a research report on public cloud security alert fatigue. The survey, held among over 800 IT professionals across five countries and ten industries …

users
How to build and retain a strong IT team

Info-Tech Research Group has released its 2022 trends report on the IT talent market. This research contains insights and strategies on how organizations can incorporate new …

Trend Micro
IoT in manufacturing market to reach $87.9 billion by 2026

The global IoT in manufacturing market is forecast to grow from $50 billion in 2021 to $87.9 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 11.9% during the …

Healthcare organizations need to step up their cybersecurity game

Protected Harbor’s whitepaper on healthcare cybersecurity offers insight into the most common threats targeting healthcare organizations, and what should be done to …

Both developers and attackers shifting to APIs

After analyzing some of the most interesting bot attacks throughout 2021, it’s clear that attackers have come to love APIs just as much as developers, Cequence Security …

The state of mobile security

A Zimperium report revealed that in 2021 threats have impacted 10 million mobile devices in at least 214 countries, with mobile malware being the most prevalent threat, …

professional
How to plan for increased security risks resulting from the Great Resignation

The Great Resignation is sweeping the world, and the causes and impacts are still being analyzed. Texas A&M University professor Anthony Klotz coined the term, predicting …

idea
Top data governance challenges and strategies for high-growth startups

Hyper-growth startups face a unique set of challenges when it comes to secure data access. Their priority is to drive rapid innovation, scale their customer base and grow …

ukraine attacks
Four key risks exacerbated by Russia’s invasion of Ukraine

Russia’s invasion of Ukraine has altered the emerging risk landscape, and it requires enterprise risk management (ERM) leaders to reassess previously established …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools