Help Net Security
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095746/industry-400x200.jpg)
The unique business-critical threats facing converged IT-OT systems
Manufacturing networks still running outdated technology could risk their intellectual property and production processes. The Trend Micro report, Securing Smart Factories: …
![Accenture](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102934/accenture-400x200.jpg)
Scaling innovation is critical for digital transformation success, but clearly presents a challenge
Standout industrial companies have found highly effective ways to scale their digital innovation efforts, resulting in much higher returns on digital investment. These …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102709/patch-400x200.jpg)
April Patch Tuesday Forecast: Be aware of end-of-service issues and browser exploits
April Patch Tuesday is nearly here with two significant topics of concern. The first relates to end-of-service milestones and the second issue is browser exploits. Let’s start …
![whois](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094721/whois-400x200.jpg)
WHOIS after GDPR: A quick recap for CISOs
2018 was a big year for data protection with the implementation of the General Data Protection Regulation (GDPR) last May — forcing CISOs and other professionals to rethink …
![Face](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101620/face-dark-400x200.jpg)
Only 12% of enterprises are consistently able to detect insider threats
73 percent of IT professionals believe that insider attacks have become more frequent in the past year. Additionally, 59 percent said that their organizations experienced at …
![shadow mining](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094700/shadow-mining-400x200.jpg)
What is shadow mining and why is it a security threat?
The majority of organizations are overlooking the threat of shadow mining, with 65 percent of organizations unfamiliar with the term and more than half (57 percent) unfamiliar …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105212/labyrinth-400x200.jpg)
85% of organizations fail to meet even basic PAM security hygiene
While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Vendor revenue from IT infrastructure products for cloud environments grew 28% year over year
Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, grew …
![Xiaomi](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094657/xiaomi-400x200.jpg)
Vulnerability found in Guard Provider, Xiaomi’s pre-installed security app
Check Point Research discovered a vulnerability in one of the preinstalled apps on devices manufactured by one of the world’s biggest mobile vendors, Xiaomi. The vulnerability …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104337/skull-400x200.jpg)
Attackers fighting back against security teams while also targeting supply chains
According to the world’s leading IR professionals, increasingly sophisticated attacks involving instances of “island hopping,” counter incident response (IR), and lateral …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094714/compliance-400x200.jpg)
79% of organizations want a federal privacy law amid lack of compliance
There is a significant enthusiasm for a federal privacy law amid organizations’ lack of ability to comply with data privacy rules stemming from both mushrooming government …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
As fraud attacks grow more sophisticated, a need for contextual detection strategies increases
Fraudsters are using a complex array of tools to build armies of fake accounts, 74% of all fraudulent accounts are created from desktops, and cloud service provider IP ranges …
Featured news
Sponsored
Don't miss
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation