Help Net Security
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/24095221/data_breach_cost2023-400x200.jpg)
Average cost of a data breach reaches $4.45 million in 2023
IBM released its annual Cost of a Data Breach Report, showing the global average cost of a data breach reached $4.45 million in 2023 – an all-time high for the report and a …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13152653/chain1-400x200.jpg)
Strengthening the weakest links in the digital supply chain
In this Help Net Security video, Marc Gaffan, CEO at IONIX, discusses how businesses’ biggest cybersecurity mistake is not protecting the full external attack surface …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28143248/privacy1-400x200.jpg)
Shaping the future of digital identity
Digital identity refers to the unique and electronically stored representation of an individual or entity’s personal information, characteristics, and attributes. It …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093228/shield3-400x200.jpg)
Consumers demand more from businesses when it comes to security
Fraudsters are opportunistic criminals and 2022 and the first few months of this year brought opportunities like never before, according to Experian. This volatility …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184416/week-in-review2-400x200.jpg)
Week in review: VirusTotal data leak, Citrix NetScaler zero-day exploitation
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Citrix ADC zero-day exploitatation: CISA releases details about attack on CI …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: July 21, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Code42, ComplyAdvantage, Diligent, Privacera, and Tenable. Tenable unveils agentless …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/14133450/ddos-082022-400x200.jpg)
Attackers intensify DDoS attacks with new tactics
As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101017/healthcare-1-400x200.jpg)
How healthcare organizations should measure their device security success
In this Help Net Security video, Chris Westphal, Head of Product Marketing at Ordr, discusses how healthcare organizations should measure their device security success and …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093017/insider_threat-400x200.jpg)
Life sciences leaders act to counter insider-driven data loss
Life sciences companies, including medical device manufacturers, biotech and pharmaceutical companies, are experiencing increasing rates of insider-driven data loss events, …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163441/computer-1-400x200.jpg)
CISOs are making cybersecurity a business problem
U.S. enterprises are responding to growing cybersecurity threats by working to make the best use of tools and services to ensure business resilience, according to ISG. …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103446/healthcare-400x200.jpeg)
Why data travel is healthcare’s next big cybersecurity challenge
Do you know where your patients’ data lives once it’s in the cloud? Unfortunately, for many healthcare organizations, the answer is no – or, at least, it’s not a definitive …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160742/llms-3-400x200.jpg)
LLMs and AI positioned to dominate the AppSec world
As modern software trends toward distributed architectures, microservices, and extensive use of third-party and open source components, dependency management only gets harder, …
Featured news
Sponsored
Don't miss
- Signatures should become cloud security history
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts