cybersecurity
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
How companies time data leak disclosures
Every year the personal data of millions of people, such as passwords, credit card details, or health details, fall into the hands of unauthorized persons through hacking or …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094509/check2-400x200.jpg)
Cybersecurity engineering under the Federal Trade Commission
When the Federal Trade Commission (FTC) releases new regulations or changes to existing ones, the implications may not be obvious to the average business or company employees. …
![NDR](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/13081444/ndr--400x200.jpg)
Security pros feel threat detection and response workloads have increased
A new report conducted by Enterprise Strategy Group (ESG) highlights why today’s security teams find it increasingly difficult to detect and stop cyber threats targeting their …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
How to find hidden data breaches and uncover threats in your supply chain
In this article, we’ll help you: Understand how breaches can stay hidden inside your supply chain Determine if your supplier relationships are increasing your risk Assess your …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110643/europe-400x200.jpg)
EU Council adopts the NIS2 directive
The European Council adopted legislation for a high common level of cybersecurity across the Union, to further improve the resilience and incident response capacities of both …
![free cybersecurity resources](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/23155056/free_cybersecurity_resources-1600-400x200.jpg)
7 free cybersecurity resources you need to bookmark
CodeSec CodeSec is a CLI based tool which brings Contrast’s enterprise-level security testing right to your laptop. It allows you to run real-time SAST or Serverless …
![dotcom](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094030/dotcom-400x200.jpg)
Many Global 2000 companies lack proper domain security
CSC released its third annual Domain Security Report that found three out of four Forbes Global 2000 companies have not adopted key domain security measures—exposing them to …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
5 cybersecurity predictions for 2023
The cyber game is now an entire underground economy wrapped around cyberattacks. Thanks to increased international friction and the activity of groups such as Lapsus$, …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/14133450/ddos-082022-400x200.jpg)
Out of the blue: Surviving an 18-hour, 39M-request DDoS attack
No online business can afford to neglect malicious bot threats. Attackers and fraudsters increasingly leverage bots to automate and coordinate attacks, driving IT teams and …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100701/chess-400x200.jpeg)
How entrepreneurs can capitalize on the impending golden age of cybersecurity
As the markets continue to fluctuate, budget cuts and layoffs now extend across the tech industry, with cybersecurity no exception from tightening its belt and assessing its …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094415/money-1-400x200.jpg)
Cyber risk focus areas for portfolio companies
IT management is a top concern, with many portfolio companies struggling with IT hygiene, potentially leaving them susceptible to costly breaches, according to a report from …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/21163930/microsoft365-city-400x200.jpg)
90% of organizations have Microsoft 365 security gaps
A recently published study evaluated 1.6 million Microsoft 365 users across three continents, finding that 90% of organizations had gaps in essential security protections. …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history