Help Net Security
![PCI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30112439/pci-ssc-400x200.jpg)
1 in 5 companies fail PCI compliance assessments of their infrastructure
According to a recent poll by SentryBay, the infrastructure of over 21% of surveyed companies has failed key PCI compliance assessments, designed to assist them to maintain …
![vmware 2020 threat landscape](https://img.helpnetsecurity.com/wp-content/uploads/2021/07/12090019/vmware-2020-threat-landscape-400x200.jpg)
2020 threat landscape: See what evaded perimeter defenses
Today’s reality is that security breaches are a given. Sophisticated attackers are too numerous and too determined to get caught by perimeter defenses. It’s relatively easy to …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
Understanding and stopping 5 popular cybersecurity exploitation techniques
With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
Paving the way for women in industrial cybersecurity research
The professional journey an individual takes is heavily influenced by the people they are surrounded with throughout their life. From an early age, I knew I wanted to study …
![threat modeling](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/28132258/threat_modeling-box-400x200.jpg)
79% of organizations identify threat modeling as a top priority in 2021
Security Compass published the results of a report designed to provide a better understanding of the current state of threat modeling in mid-sized, $100M to $999M and large …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101057/healthcare-400x200.jpg)
Health insurers facing growing risk of customer data theft
The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103023/target-400x200.jpg)
IT, healthcare and manufacturing top targets for cyberattacks
Avanan announced the release of a report which analyzes today’s threat landscape, phishing vectors, and industry-based attacks, exposing healthcare and manufacturing as two of …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
IT decision-makers doubt current data architectures will meet future model inferencing requirements
As companies look to expand their use of artificial intelligence (AI) and machine learning (ML) to keep up with the demands of their customers, they are facing hurdles getting …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094612/week_in_review1-400x200.jpg)
Week in review: How to improve your AD security posture, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: July 2021 Patch Tuesday forecast: Don’t wait for Patch Tuesday There’s been lots of …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093955/patch2-400x200.jpg)
July 2021 Patch Tuesday forecast: Don’t wait for Patch Tuesday
There’s been lots of excitement around the recently announced print spooler vulnerability CVE-2021-34527, commonly referred to as PrintNightmare. The excitement stems from the …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Three security lessons from a year of crisis
Crime thrives in a crisis, and the coronavirus was the largest collective emergency that the world has faced for decades. While there are more heroes than villains in the …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100728/tunnel-400x200.jpg)
What you need to know about transatlantic data transfers
Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …
Featured news
Sponsored
Don't miss
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform