Help Net Security
![8 Real World Use Cases for SOAR](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/07103603/swimlane-ebook-soar-400x200.jpg)
eBook: 8 Real World Use Cases for SOAR
Download this 11-page e-book with eight real-world use cases to see how security orchestration, automation and response (SOAR) can improve your team’s productivity and …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110633/ddos-world-400x200.jpg)
The frequency of DDoS attacks depends on the day and time
Multivector and cloud computing attacks have been rising over the last twelve months, according to Link11. The share of multivector attacks – which target and misuse several …
![People](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/07132926/people_work-400x200.jpg)
5 tips for acquiring cyber talent in 2020
Cybersecurity is facing a recruitment crisis. There are currently 2.8 million professionals working in the field – far from sufficient given the ever-expanding cyber threat …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
What the government infosec landscape will look this year
The information security landscape seems to evolve at a faster clip each year. The deluge of ever-changing threats, attack techniques and new breaches making headlines can be …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102016/email-1-400x200.jpg)
Study: The Blind Spots of Email Security
Malicious files and links regularly bypass email security products, leaving enterprises vulnerable to email-based attacks. Increased use of automation allows attackers to …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095734/danger-400x200.jpg)
Week in review: Most exploited vulns in 2019, Emotet sprads via Wi-Fi, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: CDPwn vulnerabilities open millions of Cisco enterprise devices to attack If you have …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100620/patch-400x200.jpg)
February 2020 Patch Tuesday forecast: A lot of love coming our way
The January 2020 Patch Tuesday was a light one as predicted; everyone was still catching up from the end-of-year holidays. As we gain momentum into February and move towards …
![Cyber Minds](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/05095212/review-cyber_minds-400x200.jpg)
Review: Cyber Minds
Humans are an essential part of any enterprise and should be considered the foundation of its cybersecurity. That’s probably easier said than done, but Shira Rubinoff has some …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100814/server-400x200.jpg)
43% of cloud databases are currently unencrypted
Palo Alto Networks released research showing how vulnerabilities in the development of cloud infrastructure are creating significant security risks. Alerts and events for …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101119/zero-400x200.jpg)
The Goldilocks principle for zero trust fraud prevention
According to Wikipedia, “zero trust is an information security framework which states that organizations should not trust any entity inside or outside of their perimeter at …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104753/iot-1-400x200.jpg)
How IoT devices open a portal for chaos across the network
Shadow IoT devices pose a significant threat to enterprise networks, according to a new report from Infoblox. The report surveyed 2,650 IT professionals across the US, UK, …
![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
Malware and ransomware attack volume down due to more targeted attacks
Cybercriminals are leveraging more evasive methods to target businesses and consumers, a SonicWall report reveals. “Cybercriminals are honing their ability to design, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege