Help Net Security
![Save on CCSP self-paced exam prep](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/07093927/ccsp-osp_training-exam_bundle_30102020-400x200.jpg)
Save on CCSP self-paced exam prep when bundled with exam voucher
Now’s your time to become recognized as a globally respected cloud expert and catapult your career with the (ISC)² Certified Cloud Security Certification (CCSP). To help you …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093155/ransomware-400x200.jpg)
Three common mistakes in ransomware security planning
As the frequency and intensity of ransomware attacks increase, one thing is becoming abundantly clear: organizations can do more to protect themselves. Unfortunately, most …
![Europol report](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/06104105/europol-report-400x200.jpg)
Europol analyzes latest trends, cybercrime impact within the EU and beyond
The global COVID-19 pandemic that hit every corner of the world forced us to reimagine our societies and reinvent the way we work and live. The Europol IOCTA 2020 cybercrime …
![mainframe](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101253/mainframe-question-400x200.jpg)
Priorities and technologies defining the mainframe in the digital enterprise
There’s an overwhelming support for mainstreaming the mainframe, new strategic priorities, and a resurgence of next generation mainframe talent, according to a BMC …
![remote work](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/01185953/remotework-manageengine-400x200.jpg)
37% of remote employees have no security restrictions on corporate devices
ManageEngine unveiled findings from a report that analyzes behaviors related to personal and professional online usage patterns. Security restrictions on corporate devices The …
![Healthcare IoT](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093856/heathcare-iot-400x200.jpg)
Working together to secure our expanding connected health future
Securing medical devices is not a new challenge. Former Vice President Cheney, for example, had the wireless capabilities of a defibrillator disabled when implanted near his …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
Cybersecurity practices are becoming more formal, security teams are expanding
Organizations are building confidence that their cybersecurity practices are headed in the right direction, aided by advanced technologies, more detailed processes, …
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093110/DevOps-1-400x200.jpg)
How important is monitoring in DevOps?
The importance of monitoring is often left out of discussions about DevOps, but a Gartner report shows how it can lead to superior customer experiences. The report provides …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093901/ai1-400x200.jpg)
Progress in implementing ethical and trusted AI-enabled systems still inconsistent
COVID-19 has put a spotlight on ethical issues emerging from the increased use of AI applications and the potential for bias and discrimination. A report from the Capgemini …
![account](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/21085008/account-hand-400x200.jpg)
As ATO attacks surge, consumers expect merchants to protect them from fraud
Attempted account takeover (ATO) attacks swelled 282 percent between Q2 2019 to Q2 2020, Sift reveals. Likewise, ATO rates for physical ecommerce businesses — those that sell …
![Panorays CISO guide](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/05132148/panorauys-ciso-guide-102020-400x200.jpg)
The CISO’s Guide to Third-Party Security Management
The CISO’s Guide to Third-Party Security Management provides the instructions you need to make your organization’s third-party security program effective and …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/19131621/lock-half-400x200.jpg)
Why developing cybersecurity education is key for a more secure future
Cybersecurity threats are growing every day, be they are aimed at consumers, businesses or governments. The pandemic has shown us just how critical cybersecurity is to the …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about