Help Net Security
![Mask](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/27144910/face-mask-black-400x200.jpg)
The parallels of pandemic response and IoT security
While adjusting to life under a pandemic, we’ve become familiar with a host of medical and safety terminology that either didn’t exist before or was of little interest to …
![Infection Monkey](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093239/infection_monkey-400x200.jpg)
Infection Monkey: Open source tool allows zero trust assessment of AWS environments
Guardicore unveiled new zero trust assessment capabilities in Infection Monkey, its open source breach and attack simulation tool. Available immediately, security …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102207/connected_car-400x200.jpg)
Consumers worry about the cybersecurity of connected vehicles
U.S. motorists worry about the cybersecurity of their connected vehicles, according to a survey by HSB, part of Munich Re. Some even believe a hacker could confront them over …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101234/keyboard-400x200.jpg)
49% of employees prefer a hybrid work arrangement
More companies are calling workers back to the office, but will they readily return? A new study by global staffing firm Robert Half shows that about 1 in 3 professionals …
![eGRC](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/07183948/egrc-400x200.jpg)
The enterprise eGRC market is expected to grow
The enterprise governance, risk, and compliance (eGRC) market is expected to register a CAGR of 12.5% in the forecast period (2021 – 2026). Organizations operate in a …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13113507/opensource-blue-400x200.jpg)
Open source security, license compliance, and maintenance issues are pervasive in every industry
Synopsys released a report that examines the results of more than 1,500 audits of commercial codebases. The report highlights trends in open source usage within commercial …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19093544/fighter-brain-tech-400x200.jpg)
Machine learning-powered cybersecurity depends on good data and experience
According to IDG’s 2020 Cloud Computing Study, 92% of organizations have at least some sort of cloud footprint in regard to their IT environment. Therefore, traditional cloud …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
The future of touchless visitor management lies with biometrics
With so many people making their way into an office building on any given day – whether as a prospective job candidate, a vendor with a delivery, or for a client meeting …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093814/user-400x200.jpg)
Advice for aspiring threat hunters, investigators, and researchers from the old town folk
There’s a big cohort of security geeks who joined the industry around the turn of the millennium by either landing “infosec” jobs or, quite frequently, just by making infosec …
![fraud detection](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/14134048/fraud_detection-400x200.jpg)
The impact of the pandemic on AML compliance and fraud strategies
New research from FICO highlights the key challenges North American fraud and financial crime teams faced amidst the COVID-19 pandemic. 68 percent of senior executives said …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/07162135/gears-400x200.jpg)
48% of IT leaders accelerated automation projects
78% of businesses plan to increase their spending on automation initiatives in the coming 12 months, SnapLogic research reveals. The study also found that this increased …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/08194013/microsoft_exchange_2020-1-400x200.jpg)
FBI removes web shells from hacked Microsoft Exchange servers
Authorities have executed a court-authorized operation to copy and remove malicious web shells from hundreds of vulnerable on-premises versions of Microsoft Exchange Server …
Featured news
Sponsored
Don't miss
- The changes in the cyber threat landscape in the last 12 months
- The CISO’s approach to AI: Balancing transformation with trust
- 10 fintech companies to watch in 2024
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data