![arrow](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093407/arrow-400x200.jpg)
Supply chain security: Five IT strategies for choosing vendors wisely
With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside …
![Vectra Cognito platform](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093428/vectra-cognito-platform-400x200.jpg)
Security pros need more and better visibility into their cloud networks
In this Help Net Security podcast, Kevin Sheu, VP Product Marketing and Marcus Hartwig, Senior Product Marketing Manager at Vectra AI, discuss the Vectra superhero survey from …
![reload](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102722/reload-400x200.jpg)
What prevents companies from achieving effective security performance management?
Cybersecurity performance is critical to achieving commercial success, according to a BitSight study. Among the study’s most interesting findings is that nearly two in five …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100825/money-400x200.jpg)
How fraud prevention tech can save banks €10M a year
A typical European bank, serving 10 million customers, could save up to €10 million annually and avoid growing fines by the regulator by implementing technology to improve the …
![hospital](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103807/hospital-400x200.jpeg)
How to reduce the attack surface associated with medical devices
As the number of connected medical devices continues to rise, so does healthcare organizations’ attack surface. “Most medical devices available in the healthcare system today …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093447/idea-400x200.jpg)
CISO priorities: Implementing security from the get-go
Dr. David Brumley, CEO of ForAllSecure, a Carnegie Mellon computer science professor (on leave), and part of the team that won the DARPA Cyber Grand Challenge, was, at one …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110246/laptop-400x200.jpg)
Cybersecurity in the age of the remote workforce
With the advent of cloud services and the proliferation of high end mobile devices (think iOS devices and Android phones), the workforce is moving inexorably to a mobile one …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094108/qualys-visibility2-400x200.jpg)
Knowing what’s on your hybrid-IT environment is fundamental to security
In this Help Net Security podcast recorded at Black Hat USA 2019, Shiva Mandalam, VP of Products, Visibility and Control at Qualys, talks about the importance of visibility. …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093451/drown-400x200.jpg)
SOCs still overwhelmed by alert overload, struggle with false-positives
Security Operations Center (SOC) analysts continue to face an overwhelming number of alerts each day that are taking longer to investigate, leading five times as many SOC …
![college](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093500/college-400x200.jpg)
What the education industry must do to protect itself from cyber attacks
Data breaches show no signs of slowing down and companies across many industry verticals fall victim to what now seems to be a regular occurrence. Most attention around data …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
How passwords paved the way for new technology
On July 15 we lost a major contributor to modern-day IT security – Dr. Fernando Corbato, the inventor of the password. Back in the early 1950s, computers could only do …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093824/money-400x200.jpg)
Cost of data breaches to surpass $5 trillion in 2024
A new report from Juniper Research found that the cost of data breaches will rise from $3 trillion each year to over $5 trillion in 2024, an average annual growth of 11%. This …
Featured news
Resources
Don't miss
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol