Help Net Security
![dislike](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094442/dislike-400x200.jpg)
Attackers use large-scale bots to launch attacks on social media platforms
Social media sites have become lucrative targets for criminals looking for quick monetization. More than half of logins (53%) on social media sites are fraudulent and 25% of …
![trend](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100743/trend-400x200.jpeg)
A look at the global network access control market
The network access market reached a valuation of ~ $953 million in 2018, according to Fact.MR. The continuous evolution of information security parameters is likely to warrant …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
How to evaluate a password management solution for business
Password managers are one of the most powerful defenses against breaches, which can cause massive damage and be incredibly expensive to mitigate. According to the Ponemon …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093503/network-400x200.jpg)
Thinking network-first to protect against security threats
The challenge of securing data has seen a dramatic shift in complexity in recent years due to an increasing number of threats frequently appearing. However, this complexity …
![Armorblox](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095148/armorblox-400x200.jpg)
Using deep learning and natural language understanding to protect enterprise communication
In this Help Net Security podcast recorded at Black Hat USA 2019, Dhananjay Sampath, CEO at Armorblox, talks about how they use natural language understanding and deep …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
Five vendors accounted for 24.1% of vulnerabilities in 2019 so far
Risk Based Security reported today that VulnDB aggregated 11,092 vulnerabilities with disclosure dates during the first half of 2019, with CVE/NVD falling behind by 4,332 …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104811/data-400x200.jpg)
Enterprises are unable to effectively use data to drive decision-making
Actian polled over 300 IT professionals with key decision-making power in a company of at least 250 employees and asked them what their critical data management pains are. Key …
![innovation](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093753/innovation-400x200.jpg)
Week in review: Red teaming, quantum computing, blockchain innovation
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Quantum computing: The new moonshot in the cyber space race The race to …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095805/connection-400x200.jpg)
Quantum computing: The new moonshot in the cyber space race
In 2016, China launched Micius, the world’s first quantum communications enabled satellite. For some, that launch eerily echoed the launch of the Soviet Union’s Sputnik …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102623/skull-400x200.jpg)
Facebook phishing surges, Microsoft still most impersonated brand
Vade Secure published the results of its Phishers’ Favorites report for Q2 2019. According to the report, which ranks the 25 most impersonated brands in phishing attacks, …
![globe](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095836/globe-400x200.jpg)
New cross-industry consortium aims to accelerate confidential computing adoption
The Linux Foundation announced the intent to form the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Cybersecurity salary, skills, and stress survey
This survey has ended. Exabeam is conducting an annual survey to understand skills, compensation trends and workplace trends among SOC and security analysts. All participants …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege