Help Net Security
![DigiCert CertCentral](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09094955/digicert-certcentral-400x200.jpg)
DigiCert announces CertCentral Enterprise, an all-in-one digital certificate management solution
DigiCert, the world’s leading provider of TLS/SSL, IoT and PKI solutions, announced DigiCert CertCentral Enterprise, a leading certificate management platform for cloud and …
![eye dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105300/eye-dark-400x200.jpg)
Taking ethical action in identity: 5 steps for better biometrics
Glance at your phone. Tap a screen. Secure access granted! This is the power of biometric identity at work. The convenience of unlocking your phone with a fingertip or your …
![online shopping](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102510/online_shopping-400x200.jpg)
eCommerce credit card fraud is nearly an inevitability
Riskified surveyed 5,000 US-based consumers aged 18 and older about their online shopping behaviors, experience with and prevalence of credit card fraud, repeat shopping …
![ENISA training](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095326/enisa-training-400x200.jpg)
Free training course material on network forensics for cybersecurity specialists
Based on current best practices, the training includes performance indicators and means that will help those who take it increase their operational skills of tackling cyber …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Enterprises are struggling with cloud complexity and security
The rush to digital transformation is putting sensitive data at risk for organizations worldwide according to the 2019 Thales Data Threat Report – Global Edition with research …
![alone](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095332/alone-400x200.jpg)
The biggest cybersecurity challenge? Communicating threats internally
IT executives responsible for cybersecurity feel a lack of support from company leaders, and 33 percent feel completely isolated in their role, according to Trend Micro. IT …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101750/cryptocurrency2-400x200.jpg)
$1.7 billion in cryptocurrency was stolen and scammed in 2018
$1.7 billion in cryptocurrency was stolen and scammed in 2018 — a dramatic rise in criminal activity despite a slump in the market, according to CipherTrace. Criminals need to …
![RSAC](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095329/rsac-crowd-400x200.jpg)
Exploring opportunities for infosec pros to use their skills to fight for social change
RSA Conference has teamed up with cybersecurity expert Bruce Schneier and the Ford Foundation to host the first full-day Public Interest Technologist Track, Bridging the Gap: …
![Password](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095338/password_field-400x200.jpg)
How privacy and security concerns affect password practices
Yubico announced the results of the company’s 2019 State of Password and Authentication Security Behaviors Report, conducted by the Ponemon Institute, who surveyed 1,761 IT …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103747/money-400x200.jpg)
Global IT spending to reach $3.8 trillion in 2019, up 3.2% from 2018
Worldwide IT spending is projected to total $3.76 trillion in 2019, an increase of 3.2 percent from 2018, according to the latest forecast by Gartner. Worldwide IT spending …
![User](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195548/entrepreneur-696976_1280-400x200.png)
What steps consumers need to take to protect themselves online
Yesterday was Data Privacy Day, so McAfee warned consumers that cybercriminals are continuing to access personal information through weak passwords, phishing emails, connected …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100916/lock-blue-400x200.jpg)
ENISA outlines top cyber threats and trends in 2018
In 2018, the cyber threat landscape changed significantly. The most important threat agent groups, namely cyber-criminals and state-sponsored actors have further advanced …
Featured news
Sponsored
Don't miss
- Review: Action1 – Simple and powerful patch management
- Securing remote access to mission-critical OT assets
- Coding practices: The role of secure programming languages
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)