Help Net Security
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092834/industrial-400x200.jpg)
Why ransomware is such a threat to critical infrastructure
A recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nation’s critical infrastructure and the ease with which their systems can be …
![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093639/kubernetes-400x200.jpg)
How to harden Kubernetes systems and minimize risk
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released a report which details threats to Kubernetes environments and …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Managing digital certificates still a challenge, automation lagging
Managing digital certificates, especially expirations and renewals, continues to be a challenging process for businesses of all sizes, a study of over 300 IT professionals in …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
Most organizations are at an elevated risk of attack
The risk of cyberattacks has increased in the last year. According to a Trend Micro survey, 80% of global organizations report they are likely to experience a data breach that …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13113507/opensource-blue-400x200.jpg)
Open source software plays an important role in the success of leading organizations
DataStax unveiled research findings that show how leading organizations are winning with data, and how others can close the gap. Through insights from over 500 technology …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093801/cloud-drive2-400x200.jpg)
Scoping cloud environments: Tips and best practices
The PCI Security Standards Council (PCI SSC) and the Cloud Security Alliance (CSA) issued a joint bulletin to highlight the importance of properly scoping cloud environments. …
![cobalt pentesting report](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/06114626/cobalt-pentesting-report-400x200.jpg)
Report: The State of Pentesting 2021
In The State of Pentesting 2021 report we dive into data from 1,602 pentests performed in 2020 on Cobalt’s Pentest as a Service (PtaaS) platform. We also survey 601 …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094612/week_in_review1-400x200.jpg)
Week in review: Clever Office 365 phishing, 2021 CWE Top 25, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Patch bypass flaw in Pulse Secure VPNs can lead to total compromise …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093952/patch1-400x200.jpg)
August 2021 Patch Tuesday forecast: Dealing with emergency patching
The PrintNightmare print spooler vulnerability, CVE-2021-34527, caused a lot of excitement last month. If you’re still in an active patch cycle, ensure you install the latest …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095042/user-400x200.jpg)
Demystifying cybersecurity with a more human-centric approach
Every business, whether small or large, needs to address cybersecurity to operate in today’s online world. This has been a stimulus for the cybersecurity industry and explains …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
Can the public cloud become confidential?
It’s been often said that the only two certain things in life are death and taxes. Over the past ten years, it seems data breaches can be added to this list. Can an …
![geometry](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094019/geometry-400x200.jpg)
How real-time computing can sound the kill chain alarm
Major attacks and ransomware incidents like SolarWinds, Colonial Pipeline or JBS highlight the critical role cybersecurity plays in protecting infrastructure and the economy. …
Featured news
Sponsored
Don't miss
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform