Help Net Security

Why EDR is not sufficient to protect your organization
Endpoint detection and response (EDR) tools are a cornerstone of most cybersecurity defenses today. But while the technology has an important role to play in investigating …

How prepared are organizations to face a ransomware attack on Kubernetes?
Veritas Technologies announced the results of a new study revealing that the majority of organizations are underprepared to face threats against their Kubernetes environments. …

Top 5 myths businesses believe about bots
Netacea announced the results from a new report showing that most businesses do not fully understand the threat bots pose, leaving those organizations vulnerable to threats. …

The problem with multiple cloud security tools: Alert fatigue and burnout
Orca Security released a research report on public cloud security alert fatigue. The survey, held among over 800 IT professionals across five countries and ten industries …

How to build and retain a strong IT team
Info-Tech Research Group has released its 2022 trends report on the IT talent market. This research contains insights and strategies on how organizations can incorporate new …

IoT in manufacturing market to reach $87.9 billion by 2026
The global IoT in manufacturing market is forecast to grow from $50 billion in 2021 to $87.9 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 11.9% during the …
Healthcare organizations need to step up their cybersecurity game
Protected Harbor’s whitepaper on healthcare cybersecurity offers insight into the most common threats targeting healthcare organizations, and what should be done to …
Both developers and attackers shifting to APIs
After analyzing some of the most interesting bot attacks throughout 2021, it’s clear that attackers have come to love APIs just as much as developers, Cequence Security …
The state of mobile security
A Zimperium report revealed that in 2021 threats have impacted 10 million mobile devices in at least 214 countries, with mobile malware being the most prevalent threat, …

How to plan for increased security risks resulting from the Great Resignation
The Great Resignation is sweeping the world, and the causes and impacts are still being analyzed. Texas A&M University professor Anthony Klotz coined the term, predicting …

Top data governance challenges and strategies for high-growth startups
Hyper-growth startups face a unique set of challenges when it comes to secure data access. Their priority is to drive rapid innovation, scale their customer base and grow …

Four key risks exacerbated by Russia’s invasion of Ukraine
Russia’s invasion of Ukraine has altered the emerging risk landscape, and it requires enterprise risk management (ERM) leaders to reassess previously established …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)