Help Net Security
![undersea cables](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/18155330/undersea-cables-400x200.jpg)
Hidden dangers loom for subsea cables, the invisible infrastructure of the internet
More than 97% of the world’s internet traffic passes through subsea cables at some point, according to ENISA. Subsea cables are a vital component of the global internet …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/14123404/ai-robot-1-400x200.jpg)
Building GenAI competence for business growth
To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance in prioritizing …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25144120/software-tools-400x200.jpg)
What AppSec and developers working in cloud-native environments need to know
All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for …
![microsoft azure](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/16192142/free_microsoft_azure_cybersecurity-1600-400x200.jpg)
18 free Microsoft Azure cybersecurity resources you should check out
Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the …
![critical infrastructure](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/20113701/critical_infrastructure-industry-400x200.jpg)
Rising OT/ICS cybersecurity incidents reveal alarming trend
60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according …
![OT](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160910/ot-400x200.jpg)
Security concerns and outages elevate observability from IT niche to business essential
Enterprises that leverage observability increase operational efficiency and grow revenue, according to SolarWinds. The report explores how enterprises can act proactively to …
![bank](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/13155356/money-bank-green-400x200.jpg)
Strong compliance management is crucial for fintech-bank partnerships
72% of banks and credit unions are prioritizing compliance when evaluating fintechs, citing it as their top criteria in the due diligence process, according to Ncontracts. As …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
Balancing budget and system security: Approaches to risk tolerance
Data breaches are a dime a dozen. Although it’s easy to look at that statement negatively, the positive viewpoint is that, as a result, cybersecurity professionals have plenty …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07115823/locks-red-400x200.jpg)
Avoiding domain security risks when taking your business online
Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165910/ai-person-400x200.png)
Companies still don’t know how to handle generative AI risks
Energized by the hype around generative AI, enterprises are aggressively pursuing practical applications of this new technology while remaining cautious about the risks, …
![PCI DSS](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/13122815/pci-dss1-400x200.jpg)
Organizations are racing against time to meet the PCI DSS 4.0 deadline
Payment data security concerns remain widespread as organizations undertake significant lift to meet the PCI DSS 4.0 deadline, according to Bluefin. 94% of survey respondents …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
The hidden dangers of low-value data
In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?