Help Net Security
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/23181110/hand-puzzle-400x200.png)
CIS Benchmarks Communities: Where configurations meet consensus
Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. That’s not the …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/01095643/connected_car-400x200.jpg)
Connected cars and cybercrime: A primer
Original equipment suppliers (OEMs) and their suppliers who are weighing how to invest their budgets might be inclined to slow pedal investment in addressing cyberthreats. To …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07115823/locks-red-400x200.jpg)
Why end-to-end encryption matters
In this Help Net Security video, Kayne McGladrey, IEEE Senior Member and Field CISO at Hyperproof, discusses end-to-end encryption (E2EE). E2EE ensures that only two parties – …
![getting started in cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16191638/getting-started-cybersecurity-400x200.jpg)
6 free resources for getting started in cybersecurity
Cybersecurity is not just a career field on the rise – it’s a calling that’s increasingly vital to the infrastructure of our world. But stepping into the …
![blocks](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095834/blocks-400x200.jpg)
5 ways in which FHE can solve blockchain’s privacy problems
Blockchain technology has gained significant traction due to its decentralized nature and immutability, providing transparency and security for various applications, …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133918/target2-400x200.jpg)
Spam is up, QR codes emerge as a significant threat vector
85% of phishing emails utilized malicious links in the content of the email, and spam emails increased by 30% from Q1 to Q2 2023, according to a VIPRE report. Information …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27170007/money-bank-400x200.jpg)
Ransomware attacks go beyond just data
65% of organizations confirmed that ransomware is one of the top three threats to their viability, and for 13%, it is the biggest threat, according to a report by Enterprise …
![Fraud losses](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/23150627/fraud_losses_red-400x200.jpg)
Global roaming fraud losses to surpass $8 billion by 2028
Losses from global roaming fraud are anticipated to exceed $8 billion by 2028; driven by the increase in bilateral roaming agreements for data-intensive use cases over 5G …
![Infosec products of the month](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115319/infosec-month-1200-400x200.jpg)
Infosec products of the month: August 2023
Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Adaptive Shield, Bitdefender, Bitwarden, Forescout, ImmuniWeb, Kingston …
![Nidhi Gani](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/03115312/nidhi-gani-featured-400x200.jpg)
Championing cybersecurity regulatory affairs with Nidhi Gani
Nidhi Gani is a seasoned regulatory affairs professional with over a decade of experience in cybersecurity, medical devices, and digital health. She’s worked with devices …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184416/week-in-review2-400x200.jpg)
Week in review: 11 search engines for cybersecurity research, PoC for RCE in Juniper firewall released
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Adapting authentication to a cloud-centric landscape In this Help Net …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: September 1, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Ciphertex Data Security, ComplyCube, Fortinet, and MixMode. Ciphertex strengthens …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?