Help Net Security
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11092828/lock-computer-blue-400x200.jpg)
Why cyber maturity assessment should become standard practice
Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help …
![free data protection regulation courses](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/04104038/free_data_protection_regulation_courses-1500-400x200.webp)
3 free data protection regulation courses you can take right now
Increasingly, information about us, and even by us, is being processed. Even mundane or insignificant details can be combined and linked with other data in a manner that may …
![encrypted storage](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27151008/encrypted_storage-1400-400x200.webp)
Secure your hybrid workforce: The advantages of encrypted storage
In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid …
![software bug](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/08155002/software_bug-400x200.jpg)
Organizations are knowingly releasing vulnerable applications
92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers …
![extortion](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/22092644/extortion-400x200.jpg)
95% believe LLMs making phishing detection more challenging
More than 95% of responding IT and security professionals believe social engineering attacks have become more sophisticated in the last year, according to LastPass. Recent AI …
![supply chain](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/12152237/supply_chain-1400-400x200.jpg)
Integrating software supply chain security in DevSecOps CI/CD pipelines
NIST released its final guidelines for integrating software supply chain security in DevSecOps CI/CD pipelines (SP 800-204D). In this Help Net Security video, Henrik Plate, …
![cybersecurity staff compensation](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/29085111/cybersecurity_staff-_compensation-400x200.webp)
New compensation trends in the cybersecurity sector
For several years, cybersecurity leaders have grappled with talent shortages in crucial cyber roles. In the face of escalating financial requirements and expanding …
![patching](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/06093817/patching-1400-400x200.jpg)
Enhancing security through proactive patch management
Despite its importance, patching can be challenging for organizations due to factors such as the sheer volume of patches released by software vendors, compatibility issues …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184416/week-in-review2-400x200.jpg)
Week in review: LockBit leak site is back online, NIST updates its Cybersecurity Framework
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Overcoming the pressures of cybersecurity startup leadership In this Help Net …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27124629/ai-eye-1400-400x200.webp)
Cybercriminals harness AI for new era of malware development
The alliance between ransomware groups and initial access brokers (IABs) is still the powerful engine for cybercriminal industry, as evidenced by the 74% year-on-year increase …
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/26143802/devops-1400-2024-400x200.jpg)
Key areas that will define the intersection of AI and DevOps
Eficode research indicates that 96% of developers use AI tools, with most coders bypassing security policies to use them. With no standardized AI tool regulations, researchers …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/24144150/usa-flag-1-400x200.jpg)
Businesses foresee major impact from new SEC cybersecurity disclosure rules
While 98% of security professionals and executives have started working to comply with the new U.S. Securities and Exchange Commission (SEC) cybersecurity disclosure ruling, …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities