Help Net Security
![2020](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/03123920/2020wall-400x200.jpg)
What do cybercriminals have in store for 2020?
As we look to 2020 and a new decade, cybersecurity will continue to be a top priority for businesses and consumers alike. To help organizations prepare for the next year and …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094406/cloud1-400x200.jpg)
What steps should agencies take to better prepare for a multi-cloud future?
Agencies do not feel prepared to manage current multi-cloud environments. While most Federal IT decision makers say their agency already uses multiple cloud platforms (81 …
![consumer](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105245/consumer-400x200.jpg)
Cybersecurity regulation is not one-size-fits-all
Differences in cultural values have led some countries to tackle the spectre of cyberattacks with increased internet regulation, whilst others have taken a …
![build](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100100/build-400x200.jpg)
Supply chain examination: Planning for vulnerabilities you can’t control
Seemingly, there are numerous occurrences when the customer’s personally identifiable information stored by an organization’s third-party provider is set loose by malicious …
![secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111740/secure-400x200.jpg)
Prevent credential stuffing and account takeover attacks with these expert tips
Account takeover and credential stuffing attacks are two security threats that often go hand in hand. Both have become alarmingly prominent: a recent report found that …
![European flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112250/euflag-400x200.jpg)
European cybersecurity market to exceed $65 billion by 2025
The European cybersecurity market is determined to exceed $65 billion by 2025, according to Graphical Research. This growth is attributed to strong government initiatives to …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
Webinar: How to secure complex, multi-cloud environments
Enterprises today are leveraging multiple clouds for the cost and scale benefits that cloud brings, but rapid adoption is creating new challenges for CISOs and their teams. As …
![cybersecurity company benefits](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/30113109/cybersecurity_company_benefits-400x200.png)
Cybersecurity company benefits should reduce stress but don’t
From start-ups to Silicon Valley giants, tech company employees work in some of the most luxurious offices in the world, especially as the best of businesses battle to attract …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100615/EU-lock-400x200.jpg)
Insight into NIS Directive sectoral incident response capabilities
An analysis of current operational incident response (IR) set-up within the NIS Directive sectors has been released by ENISA. The NIS Directive and incident response The EU’s …
![cryptocurrency](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101752/cryptocurrency-400x200.jpg)
2019 experienced massive spate of crypto crimes, $4.4 billion to date
With only seven months left for nations to pass laws and virtual asset service providers (VASPs) to comply with the guidelines, the majority of cryptocurrency exchanges are …
![drone](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/30104801/drone-400x200.jpg)
Hacking robotic vehicles is easier than you might think
Robotic vehicles like Amazon delivery drones or Mars rovers can be hacked more easily than people may think, a research from the University of British Columbia suggests. …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
Week in review: The data skills gap, new Kali Linux release, Apache Solr RCEs with public PoCs
Here’s an overview of some of last week’s most interesting news and articles: The overlooked part of an infosec strategy: Cyber insurance underwriting When a data …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege