Help Net Security
Backdoors inevitably create vulnerabilities that can be exploited by malicious actors
73 percent of IT security professionals believe countries with government-mandated encryption backdoors are more susceptible to nation-state attacks. The Venafi survey on …
Women are increasingly climbing the cybersecurity leadership ladder
Women now represent 24% of the cybersecurity workforce. While the stronger representation of women in the cybersecurity workforce is encouraging, challenges like wage …
Securing your home increasingly means securing all of your IoT devices
The Internet of Things explosion has proven controversial due to the insufficient security measures in many of these internet-connected devices. IoT attacks increase And a new …
Current and emerging third-party cyber risk management approaches and challenges
Managing third-party cyber risk is critical for businesses, but a lack of continuous monitoring, consistent reporting, and other blind spots are creating challenges that could …
Consumers concerned about privacy but willing to take risks for convenience
In today’s connected world, businesses are prime targets for cyber attacks and unintentional missteps can result in critical exposure of consumers’ sensitive personal …
The CIO’s greatest roadblock to Agile development: Security governance
Today, the greatest roadblock CIOs face when adopting Agile development is not ‘security in general,’ but ‘security governance.’ We can define ‘security governance’ as the …
Anomali: Threat detection, investigation and response
In this Help Net Security podcast recorded at RSA Conference 2019, Nicholas Hayden, Senior Director of Threat Intelligence at Anomali, talks about how Anomali arms security …
Encryption deployment increases as organizations struggle to address compliance requirements
As organizations embrace the cloud and new digital initiatives such as the IoT, blockchain and digital payments the use of trusted cryptography to protect their applications …
90% of companies interested in crowdsourced security programs
The evolving threat landscape and perennial cybersecurity challenges are giving rise to community-based programs such as crowdsourced cybersecurity, an important evolution …
Financial sector recognizes the benefits of hybrid cloud but still struggles to enable IT transformation
The financial sector outpaces other industries in the adoption of hybrid cloud, with the deployment of hybrid cloud reaching 21% penetration today, compared to the global …
45% of taxpayers do not securely store tax documents
Despite almost four in 10 (38 percent) taxpayers saying they are worried they will become a victim of tax fraud or tax identity theft during tax season, 45 percent admit to …
How to Marie Kondo your data
By now you’ve heard about Marie Kondo, the author of New York Times bestseller, The Life Changing Magic of Tidying Up, and star of Tidying Up, the new Netflix show that puts …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits