Help Net Security

Why do organizations need to prioritize cyber resiliency?
OpenText announced a report which provides in-depth analysis, market insights, trend data, and predictions for what lies ahead as organizations move toward strengthening their …

BYOD and enterprise mobility market to reach $157.3 billion by 2026
Amid the COVID-19 crisis, the global market for BYOD and enterprise mobility estimated at $84.4 billion in the year 2022, is projected to reach a revised size of $157.3 …
Ransomware payments hitting new records in 2021
As cybercriminals increasingly turned to the dark web to pressure victims to pay up by threatening to release sensitive data, ransomware has reached new heights, Palo Alto …
The importance of implementing continuous security in the development lifecycle
A research from Wabbi and IDG found that companies which utilize continuous security have seen a 50% decrease in vulnerabilities. As the number of attacks increase daily, it …

Web3 and the future of data portability: Rethinking user experiences and incentives on the internet
Tech conversations are now peppered with a new, contentious buzzword: Web3, and we’re all likely to hear a lot more of it in the coming years. It’s an umbrella term for …

Product showcase: Secure online authentication “Made in Germany” by Swissbit
New iShield FIDO2 USB-A / NFC security key protects access to applications and online services. Today it is more critical than ever before for businesses to equip themselves …

Posts on name-and-shame dark web leak sites climbed 85% in 2021
Ransomware payments hit new records in 2021 as cybercriminals increasingly turned to dark web leak sites where they pressured victims to pay up by threatening to release …

The benefits of implementing continuous security in the development lifecycle
Wabbi published new research with IDG that finds companies utilizing continuous security have decreased vulnerabilities by 50%. The study focused on the integration of …

How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …

DevOps market to exceed $30 billion by 2028
The DevOps market is expected to surpass $30 billion by 2028, as reported in a research study by Global Market Insights. The growing demand to minimize system development …

Design, prioritize, and implement a cyber defense program with CIS CDM 2.0
The Center for Internet Security (CIS) Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise’s cybersecurity program. …
COVID bounce: A massive 2021 resurgence of cyberthreats
2021 was marked by a massive resurgence of cyberthreats, with a 77% increase in malware detection over 2020, a Malwarebytes’ research revealed. Business-focused …
Featured news
Resources
Don't miss
- Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
- China-linked Salt Typhoon hackers attempt to infiltrate European telco
- Most AI privacy research looks the wrong way
- Why ex-military professionals are a good fit for cybersecurity
- Nodepass: Open-source TCP/UDP tunneling solution