Help Net Security
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/23181110/hand-puzzle-400x200.png)
How the best CISOs leverage people and technology to become superstars
What separates superstar CISOs from the rest of the pack is that they are keenly aware of the burgeoning threat landscape and the cybersecurity skills shortage, but they don’t …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12090833/vulnerability-bug-400x200.jpg)
Relying on CVSS alone is risky for vulnerability management
A vulnerability management strategy that relies solely on CVSS for vulnerability prioritization is proving to be insufficient at best, according to Rezilion. In fact, relying …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/03132545/opensource-400x200.jpg)
Open-source security challenges and complexities
Open source refers to software or technology that is made available to the public with its source code openly accessible, editable, and distributable. In other words, the …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203455/data_analytics6-400x200.jpg)
The race against time in ransomware attacks
Most organizations lack strong cyber resilience strategies or data security capabilities to address threats and maintain business continuity, according to BigID. Despite both …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184227/week-in-review-400x200.jpg)
Week in review: Ivanti zero-day exploited, MikroTik vulnerability could compromise 900,000 routers
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Key factors for effective security automation In this Help Net Security …
![ZTNA](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/26120527/ztna-400x200.jpg)
ZTNA can be more than a VPN replacement for application access
In the wake of increased workforce mobility, today’s organizations require more innovative, more flexible, and more secure methods of granting network and application access …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: July 28, 2023
Here’s a look at the most interesting products from the past week, featuring releases from BreachRx, Darktrace, Dig Security, Panorays, and SeeMetrics. Panorays unveils …
![ChatGPT](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/04123002/chatgpt-future-400x200.jpg)
Blocking access to ChatGPT is a short term solution to mitigate risk
For every 10,000 enterprise users, an enterprise organization is experiencing approximately 183 incidents of sensitive data being posted to ChatGPT per month, according to …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13141257/usa-flag-400x200.jpg)
National Cyber Strategy Implementation Plan: What you need to know
The Biden-Harris Administration’s recently released National Cybersecurity Strategy calls for two fundamental shifts in how the United States allocates roles, …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/20151654/zero_trust-400x200.jpg)
CISOs consider zero trust a hot security ticket
The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102709/patch-400x200.jpg)
A step-by-step guide for patching software vulnerabilities
Coalition’s recent Cyber Threat Index 2023 predicts the average Common Vulnerabilities and Exposures (CVEs) rate will rise by 13% over 2022 to more than 1,900 per month in …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
Why are computer security guidelines so confusing?
If you find the computer security guidelines you get at work confusing and not very useful, you’re not alone. A new study highlights a key problem with how these guidelines …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?