Help Net Security
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
Most AppSec pros see a growing divide between them and developers
75% of AppSec practitioners and 49% of developers believe there is a cultural divide between their respective teams, according to ZeroNorth. As digital transformation takes …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Cyberwarfare predicted to damage the economy in the coming year
71% of CISOs believe cyberwarfare is a threat to their organization, and yet 22% admit to not having a strategy in place to mitigate this risk. This is especially alarming …
![DaaS BYOD](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/17112500/daas-byod-leasing-400x200.jpg)
DaaS, BYOD, leasing and buying: Which is better for cybersecurity?
In the digital age, staff expect employers to provide hardware, and companies need hardware that allows employees to work efficiently and securely. There are already a number …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095742/data-400x200.jpg)
Secure data sharing in a world concerned with privacy
The ongoing debate surrounding privacy protection in the global data economy reached a fever pitch with July’s “Schrems II” ruling at the European Court of Justice, which …
![NIST](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/17142818/nist-logo-x-400x200.jpg)
Only 44% of healthcare providers conform to protocols outlined by the NIST CSF
Only 44% of healthcare providers, including hospital and health systems, conformed to protocols outlined by the NIST CSF – with scores in some cases trending backwards …
![climb](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100634/climb-400x200.jpg)
What are the traits of an effective CISO?
Only 12% of CISOs excel in all four categories of the Gartner CISO Effectiveness Index. “Today’s CISOs must demonstrate a higher level of effectiveness than ever before,” said …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112510/hole-400x200.jpg)
Shift to remote work and heavy reliance on service providers for security leaves blind spots
83% of C-level executives expect the changes they made in the areas of people, processes, and applications as a response to the COVID-19 pandemic to become permanent (whether …
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
5 simple steps to bring cyber threat intelligence sharing to your organization
Cyber threat intelligence (CTI) sharing is a critical tool for security analysts. It takes the learnings from a single organization and shares it across the industry to …
![NIST Phish Scale](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/18131512/nist-phish_scale-400x200.jpg)
Phish Scale: New method helps organizations better train their employees to avoid phishing
Researchers at the National Institute of Standards and Technology (NIST) have developed a new method called the Phish Scale that could help organizations better train their …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
A look at the top threats inside malicious emails
Web-phishing targeting various online services almost doubled during the COVID-19 pandemic: it accounted for 46 percent of the total number of fake web pages, Group-IB …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101644/money-400x200.jpg)
80% of businesses expect IT budgets to grow or remain steady in 2021
The global COVID-19 crisis is a catalyst for change, spurring businesses to continue to invest in technology to support and secure a remote workforce, despite slowing …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Cybercriminals moved quickly to capitalize on the COVID-19 outbreak using malicious emails
While the COVID-19 outbreak has disrupted the lives and operations of many people and organizations, the pandemic failed to interrupt onslaught of malicious emails targeting …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about