Help Net Security

What makes edge computing successful?
To compete in a digital-first world, organizations are prioritizing investments in digital tools to augment physical spaces and assets and enable seamless and secure data …

Consumer IAM market to reach $17.6 billion by 2026
The global consumer IAM market is projected to grow from $8.6 billion in 2021 to $17.6 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 15.3% during the forecast …

Ransomware, supply chain, and deepfakes: The top threats the finance industry needs to prepare for
The finance industry is constantly targeted by numerous threat actors, and they are always innovating and trying new techniques (such as deepfakes) to outsmart security teams …

2022 promises to be a challenging year for cybersecurity professionals
I am very glad to turn the page on 2021, however, I am not optimistic that 2022 will be remarkably better. I am hopeful that President Biden’s Executive Order 14028 and the …

How safe are cloud applications?
Netskope released a research highlighting the continued growth of malware and other malicious payloads delivered by cloud applications. The year-over-year analysis identifies …

SMEs still an easy target for cybercriminals
Cybercrime continues to be a major concern, with 51% of SMEs experiencing a cybersecurity breach, a Markel Direct survey reveals. In this survey that polled 1000 respondents, …

Technology-related employment still going strong, unemployment rate for IT jobs dropping to 2%
Technology-related employment and hiring opportunities continue to expand, according to an analysis by CompTIA. December’s technology employment gains bucked the …

Digital asset management market to reach $10.018 billion in 2026
The global digital asset management market is expected to grow at a compound annual growth rate of 18.36% over the forecast period to reach a market size of $10.018 billion in …

Audit Your Active Directory with a free, read-only scan from Specops
Specops Password Auditor is a read-only tool that scans your Active Directory and identifies password-related vulnerabilities. The collected information generates multiple …

Analyst guide: Encryption solutions buyers checklist
Encryption plays a key part in email security, ensure you find the right fit for your enterprise. Finding ways to secure information effectively is a must. This challenge is …

Small businesses are most vulnerable to growing cybersecurity threats
Many small and medium-sized businesses (SMBs) mistakenly assume (hope?) their size makes them a less appealing target to hackers, without realizing cyber criminals are eager …

Data security in the age of insider threats: A primer
Of course, your employees are diligent, security conscious and loyal. But the real world tells a different story. A grand total of 94% of organizations had an insider data …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)