Help Net Security
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
Moving to the cloud with a security-first, zero trust approach
Many companies tend to jump into the cloud before thinking about security. They may think they’ve thought about security, but when moving to the cloud, the whole concept of …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/20131001/lock-storm-security-400x200.jpg)
Preventing cybersecurity’s perfect storm
Zerologon might have been cybersecurity’s perfect storm: that moment when multiple conditions collide to create a devastating disaster. Thanks to Secura and …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093204/connection1-400x200.jpg)
Researchers open the door to new distribution methods for secret cryptographic keys
Researchers from the University of Ottawa, in collaboration with Ben-Gurion University of the Negev and Bar-Ilan University scientists, have been able to create optical framed …
![Work](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19140648/work-home-400x200.jpg)
CISOs split on how to enable remote work
CISOs are conflicted about how their companies can best reposition themselves to address the sudden and rapid shift to remote work caused by the pandemic, Hysolate research …
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093749/cloud-money1-400x200.jpg)
Global spending on cloud services to surpass $1 trillion in 2024
The COVID-19 pandemic has largely proven to be an accelerator of cloud adoption and extension and will continue to drive a faster conversion to cloud-centric IT. Global …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092947/lock-400x200.jpg)
Webinar: How to think about cybersecurity the way executives think about business
It’s time to change the way we think about cybersecurity and risk management. Cybersecurity is no longer an IT problem to solve or a “necessary evil” to cost manage. Rather, …
![passwordless](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/19132738/passwordless-400x200.jpg)
Can we trust passwordless authentication?
We are beginning to shift away from what has long been our first and last line of defense: the password. It’s an exciting time. Since the beginning, passwords have aggravated …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
SecOps teams turn to next-gen automation tools to address security gaps
SOCs across the globe are most concerned with advanced threat detection and are increasingly looking to next-gen automation tools like AI and ML technologies to proactively …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
Is poor cyber hygiene crippling your security program?
Cybercriminals are targeting vulnerabilities created by the pandemic-driven worldwide transition to remote work, according to Secureworks. The report is based on hundreds of …
![fingerprint](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104545/fingerprint-400x200.jpg)
Biometric device revenues to drop 22%, expected to rebound in 2021
In the aftermath of the COVID-19 pandemic, global biometric device revenues are expected to drop 22%, ($1.8 billion) to $6.6 billion, according to a report from ABI Research. …
![Netsparker Enterprise](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/18164721/review-netsparker-enterprise-400x200.jpg)
Review: Netsparker Enterprise web application scanner
Vulnerability scanners can be a very useful addition to any development or operations process. Since a typical vulnerability scanner needs to detect vulnerabilities in …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Global adoption of data and privacy programs still maturing
The importance of privacy and data protection is a critical issue for organizations as it transcends beyond legal departments to the forefront of an organization’s …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about