Help Net Security
![Phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112408/phone-red-400x200.jpg)
How can companies prioritize contact center security?
Security is front of mind for a lot of organizations these days, especially due to the 400% increase in cyberattacks since the pandemic started. Notable and alarming attacks …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
Most mobile finance apps vulnerable to data breaches
77% of financial apps have at least one serious vulnerability that could lead to a data breach, an Intertrust report reveals. This report comes at a time where finance mobile …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095742/data-400x200.jpg)
Data privacy management software market to grow steadily
The data privacy management software market saw soaring growth in 2020 with worldwide revenues up 46.1% year over year. IDC expects this growth to continue over the next …
![US Department of Justice](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113407/doj-400x200.jpg)
DoJ seized $2.3 million paid to the Colonial Pipeline ransomware extortionists
The Department of Justice has seized 63.7 bitcoins currently valued at approximately $2.3 million. These funds allegedly represent the proceeds of a May 8, ransom payment to …
![COVID-19](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/07134313/covid-19-mask-400x200.jpg)
Defending the COVID-19 vaccine rollout with best practices from the cybersecurity industry
Over the past year, pharmaceutical companies and healthcare organizations have rushed to develop a COVID-19 vaccine. It is a testament to the innovations of the medical …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Reformulating the cyber skills gap
Despite a positive (and significant) decrease from over 4 million unfilled cybersecurity jobs in 2019, there is still a staggering 3.12 million global shortage of workers with …
![iOS 15](https://img.helpnetsecurity.com/wp-content/uploads/2021/06/08061925/ios15-400x200.jpg)
Apple privacy protections in iOS 15, iPadOS 15, macOS Monterey, and watchOS 8
Apple previewed new privacy protections in iOS 15, iPadOS 15, macOS Monterey, and watchOS 8, which help users better control and manage access to their data. “Privacy has been …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095042/user-400x200.jpg)
Unauthorized access accounts for 43% of all breaches globally
There has been a 450% surge in breaches containing usernames and passwords globally, according to a ForgeRock report. Researchers also found unauthorized access was the …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Application security approaches broken by rising adoption of cloud-native architectures
The rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security, a survey of 700 CISOs by Coleman …
![MITRE ATT&CK](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/15120235/mitre-attack-400x200.jpg)
Guidance to help cyber threat intelligence analysts apply MITRE ATT&CK
CISA has partnered with the Homeland Security Systems Engineering and Development Institute (HSSEDI), which worked with the MITRE ATT&CK team, to issue guidance to help …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
The evolution of cybersecurity within network architecture
The vulnerable state of the world during the pandemic paved way for an aggressive onslaught of attacks, with around 39 percent of businesses experiencing a cybersecurity …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092919/code2-400x200.jpg)
Keeping pace with evolving code signing baseline requirements
Maintaining code integrity has always been top of mind for today’s development-driven organizations. However, the recent SolarWinds breach was a stark reminder of the …
Featured news
Sponsored
Don't miss
- The changes in the cyber threat landscape in the last 12 months
- The CISO’s approach to AI: Balancing transformation with trust
- 10 fintech companies to watch in 2024
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data