Help Net Security
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/01101252/compliance2-400x200.jpg)
Regulatory activity forces compliance leaders to spend more on GRC tools
Legal and compliance department investment in GRC (governance, risk, and compliance) tools will increase 50% by 2026, according to Gartner. Assurance leaders are seeking out …
![connections](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142123/computer-connections-400x200.jpg)
Critical business app outages cost $500,000 per hour of downtime
Observability’s adoption is on the rise and full-stack observability leads to better service-level metrics, such as fewer, shorter outages and lower outage costs, according to …
![data breaches](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/11141418/data_breaches-400x200.jpg)
When data falls into the wrong hands
A data breach involves unauthorized access to sensitive, protected, or confidential information, often resulting in data theft, exposure, or alteration. The methods employed …
![PostgreSQL](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/17135143/postgresql-400x200.jpg)
PostgreSQL 16: Where enhanced security meets high performance
PostgreSQL is an open-source object-relational database platform with a track record of over 25 years of ongoing development. Its reputation is solid for its reliability, …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184416/week-in-review2-400x200.jpg)
Week in review: 17 free AWS cybersecurity courses, exploited Chrome zero-day
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The blueprint for a highly effective EASM solution In this Help Net Security …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145250/laptop-data2-400x200.png)
Modernizing fraud prevention with machine learning
The number of digital transactions has skyrocketed. As consumers continue to spend and interact online, they have growing expectations for security and identity verification. …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: September 15, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Armis, Cisco, CTERA, Kingston Digital, Purism, and Swissbit. Librem 11 tablet sets …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13161306/authentication-biometrics-400x200.jpg)
Enterprises persist with outdated authentication strategies
Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203450/data_analytics3-400x200.jpg)
Cybersecurity risks dampen corporate enthusiasm for tech investments
64% of IT leaders believe that cybersecurity concerns are negatively impacting their organization’s willingness to invest in innovative tech, according to a report by HPE …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133914/ai-robot-bot-400x200.jpg)
Generative AI lures DevOps and SecOps into risky territory
Application security leaders are more optimistic than developer leaders on generative AI, though both agree it will lead to more pervasive security vulnerabilities in software …
![Michal Geva](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/13130438/podcast-michal_geva-400x200.jpg)
Securing OTA with Harman International’s Michal Geva
The once far-off vision of remotely updating software without needing to bring it into a service center was initially designed for bug fixes and cybersecurity updates. Today, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Access control in cloud-native applications in multi-location environments (NIST SP 800-207)
NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?