Help Net Security
![IT job](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095412/itjob-400x200.jpg)
Unplanned work makes it hard to deliver digital transformation
Time-critical, unplanned work caused by IT disruptions continues to plague enterprises around the world, leading to lost revenue, significant employee morale problems and …
![world danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101905/world-danger-400x200.jpg)
Coronavirus: You don’t get a pass when it comes to cybersecurity
I was saddened to learn that two people who attended RSAC 2020 in San Francisco had subsequently tested positive for COVID-19. This virulent disease has impacted our lives …
![Panorays CCPA](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/15094711/ccpa-twitter-helpnet-400x200.png)
Guide: Supplier CCPA readiness for security and IT teams
It’s important for security and IT professionals to understand how the California Consumer Privacy Act (CCPA) will affect how they do their jobs. Businesses that fail to …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
Phishing is a huge concern among security decision-makers and influencers
A serious disconnect exists between how decision makers (i.e., CISOs, CIOs and CEOs), and security practitioners (i.e., IT managers and directors, security architects and …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111946/danger-400x200.jpg)
Three actions to boost your organization’s resilience against coronavirus disruptions
With the spread of the coronavirus (COVID-19), CIOs should focus on three short-term actions to increase their organizations’ resilience against disruptions and prepare for …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094125/5G-400x200.jpg)
Can 5G make you more vulnerable to cyberattacks?
Many enterprises and sectors are unaware of the 5G security vulnerabilities that exist today. Choice IoT says it’s critical for businesses to have a plan for discovering and …
![quantum](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104847/quantum-400x200.jpg)
Early investment in quantum computing could result in a competitive advantage
Improved AI capabilities, accelerated business intelligence, and increased productivity and efficiency were the top expectations of organizations currently investing in …
![abstract, generic](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110119/abstract5-400x200.jpg)
Week in review: Trojanized hacking tools, coronavirus scams, (IN)SECURE Magazine special issue
Here’s an overview of some of last week’s most interesting news, articles and podcasts: The haphazard response to COVID-19 demonstrates the value of enterprise …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112909/user-400x200.jpg)
The human element in security is still needed to combat application vulnerabilities
While over half of organizations use artificial intelligence or machine learning in their security stack, nearly 60 percent are still more confident in cyberthreat findings …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110633/ddos-world-400x200.jpg)
DDoS attacks could affect next generation 911 call systems
Despite a previous warning by Ben-Gurion University of the Negev (BGU) researchers, who exposed vulnerabilities in 911 systems due to DDoS attacks, the next generation of 911 …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Cloud + BYOD + IoT = major security gaps
Despite having hundreds of tools at their disposal, IT and security teams are rapidly losing sight of their asset landscape. That’s the finding from a survey from Axonius, …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094400/chip1-400x200.jpg)
Most computers easy to hack due to vulnerability in memory chips
Most computer systems are still very easy to hack, due to a vulnerability in memory chips produced by Samsung, Micron and Hynix, according to a study by researchers from VUSec …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege