Help Net Security
![payments](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100545/payments-400x200.jpeg)
Will biometrics replace passwords for online payment authentication?
Over half of consumers in the UK (53 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud, …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101128/people-400x200.jpeg)
How much do you know about your invisible workforce?
The way work gets done is changing. To tap into specialized talent, organizations increasingly rely on the external workforce, which includes contingent workers such as …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Embrace chaos to improve cloud infrastructure resilience
Netflix is a champion of using chaos engineering to improve the resilience of its cloud infrastructure. That’s how it ensures its customers don’t have their Stranger Things …
![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111014/firefighters-400x200.jpg)
2018 in numbers: Data breaches cost $654 billion, expose 2.8 billion data records in the U.S.
Cybercriminals exposed 2.8 billion consumer data records in 2018, costing over $654 billion to U.S. organizations, according to ForgeRock. Cyberattacks to U.S. financial …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094909/criminal2-400x200.jpg)
Despite disclosure laws, cybercrime may be widely underreported
While attack vectors remain largely the same year over year, attack volume will increase and cybercrime may be vastly underreported, according to the 2019 State of …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Unclassified data creates security blind spots for most companies
Global businesses continue to house ‘dark data’ within their organizations, creating a honeypot for cybercriminals, finds research from Veritas Technologies. The …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101936/spotlight-400x200.jpeg)
Is your private equity firm exposed to these hidden IT risks?
Skydivers know that there is a risk their parachute won’t open. Police officers know their daily jobs come with the inherent risk of danger. And private equity firms know …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
Is AI fundamental to the future of cybersecurity?
While a significant proportion of SMEs believe in their current approach to security, they are struggling when it comes to allocation of budget, according to a Senseon …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
How organizations are managing vulnerability risks
Tripwire evaluated how organizations are managing vulnerability risks and found that more than one in four (27 percent) globally have been breached as a result of unpatched …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094214/qualys-400x200.jpg)
Qualys at Infosecurity Europe 2019: Hear best practices from industry leaders
There will be no lack of interesting content from Qualys at Infosecurity Europe 2019 this year. Depending on you interests, you might want to make time for some of these talks …
![Field-programmable gate arrays](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094223/research-400x200.jpg)
Scientists uncover vulnerability in FPGAs, affecting cloud services and IoT
Field-programmable gate arrays (FPGAs) are, so to say, a computer manufacturer’s “Lego bricks”: electronic components that can be employed in a more flexible …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110903/car-green2-400x200.jpg)
How likely are weaponized cars?
It is easy to become absorbed by the exaggerated Hollywood depictions of car hacking scenarios – to imagine a not-so-distant future when cars or their supporting …
Featured news
Sponsored
Don't miss
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation
- Cirrus: Open-source Google Cloud forensic collection