Help Net Security
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092903/lock-blue-400x200.jpg)
ESG regulatory requirements present risk but also opportunities
Regulatory risk related to environmental, social and governance (ESG) disclosures has rapidly risen to the second overall position in Gartner’s latest report. ESG regulatory …
![Realtek](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/16122316/realtek-082021-400x200.jpg)
65 vendors affected by severe vulnerabilities in Realtek chips
A vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems and other network devices. The chips …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
How to foster collaboration with the IT team for a successful zero trust implementation
The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093605/zero-400x200.jpg)
Even the US president wants zero trust: Here’s how to make it a reality
President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Demand for data is growing, but so are data supply chain challenges
Data suppliers are unable to efficiently deliver relevant data to a growing number of data consumers, according to a 451 Research survey. 55% of those surveyed report that …
![error](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/13134949/error-x-400x200.jpg)
Reliance on third party workers making companies more vulnerable to cyberattacks
A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
Most employees reusing personal passwords to protect corporate data
Nearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
SMEs awareness of GDPR is high, but few adhere to its legal requirements
85 percent of the small- to medium-sized enterprises (SMEs) in the UK are familiar with GDPR, but more than half are still not cleaning their data and therefore not adhering …
![(ISC)² guide](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/12132320/isc_2_b_12082021-400x200.jpg)
(ISC)² guide to continuing professional education
You’ve worked hard to earn a globally recognized (ISC)² certification or maybe you’re thinking about obtaining an (ISC)² certification. As a leader in the cybersecurity field, …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094609/week_in_review3-400x200.jpg)
Week in review: Healthcare CISOs challenges, another Windows Print Spooler bug
Here’s an overview of some of last week’s most interesting news, articles and interviews: Microsoft confirms another Windows Print Spooler bug, offers workaround …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101159/arrows-400x200.jpg)
Stop the breaches! Four steps to minimize security risks
Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/19160906/apple-lock-400x200.jpg)
How to prepare for Apple’s Mail Privacy Protection
Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half …
Featured news
Sponsored
Don't miss
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform