Help Net Security
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093759/arrow-400x200.jpg)
CISOs: Make 2020 the year you focus on third-party cyber risk
While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Over half of organizations were successfully phished in 2019
Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
More authentication and identity tech needed with fraud expected to increase
The proliferation of real-time payments platforms, including person-to-person (P2P) transfers and mobile payment platforms across Asia Pacific, has increased fraud losses for …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093605/zero-400x200.jpg)
Zero Trust: Beyond access controls
As the Zero Trust approach to cybersecurity gains traction in the enterprise world, many people have come to recognize the term without fully understanding its meaning. One …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
There is no easy fix to AI privacy problems
Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
CIOs using AI to bridge gap between IT resources and cloud complexity
There’s a widening gap between IT resources and the demands of managing the increasing scale and complexity of enterprise cloud ecosystems, a Dynatrace survey of 800 …
![container](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102319/container-400x200.jpg)
Container security requires continuous security in new DevSecOps models
When Jordan Liggitt at Google posted details of a serious Kubernetes vulnerability in November 2018, it was a wake-up call for security teams ignoring the risks that came with …
![light](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100048/light-400x200.jpg)
Companies risk revenue growth due to innovation achievement gap
While a majority of CEOs express strong confidence in the effectiveness of their current IT systems, most are struggling to close the innovation achievement gap to drive …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095839/email-400x200.jpg)
Email security industry miss rates when encountering threats are higher than 20%
Email security miss rates are definitely a huge issue. Malicious files regularly bypass all of today’s leading email security products, leaving enterprises vulnerable to …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102220/bulb-400x200.jpg)
State CIOs see innovation as critical priority, only 14% report extensive innovation
Most state CIOs see innovation as a major part of their job – 83% said innovation is an important or very important part of their day-to-day leadership responsibilities – …
![secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111740/secure-400x200.jpg)
Download: State of Breach Protection 2020 survey results
What are the key considerations security decision-makers should take into account when designing their 2020 breach protection? To answer this, Cynet polled 1,536 cybersecurity …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092834/industrial-400x200.jpg)
Researchers create OT honeypot, attract exploits and fraud
Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege