cybersecurity
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110509/usa-flag-1-400x200.jpg)
The cyber posture of the U.S. Federal Government
Government agencies are prime targets for attack due to the sheer amount of sensitive information they possess. As today’s geopolitical landscape continues to become …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Massive shadow code risk for world’s largest businesses
Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Autonomous vehicles can be tricked into erratic driving behavior
When a driverless car is in motion, one faulty decision by its collision-avoidance system can lead to disaster, but researchers at the University of California, Irvine have …
![SASE](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14135733/sase-hns-400x200.jpg)
Paving your path to SASE: 4 tips for achieving connectivity and security
Today, optimized network connectivity and security are both first-class citizens; IT teams can no longer sacrifice one for the other. As the number of distributed workers …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
How cybercriminals are targeting executives at home and their families
Top executives and their families are increasingly being targeted on their personal devices and home networks, as sophisticated threat actors look for new ways to bypass …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/18191201/vault-bkg-400x200.jpg)
Future proofing: How companies can upgrade cyber defenses and be ready for tomorrow
Today’s threat landscape is constantly evolving. Threat actors and tactics are becoming more determined and advanced. In this video for Help Net Security, Jaspal Sawhney, …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
Zero-trust-washing: Why zero trust architecture is the framework to follow
Have we got to the point where the term “zero trust” is being misused or misrepresented by some vendors as they look to capitalize on its momentum in the market? It is a …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094909/criminal2-400x200.jpg)
57% of all digital crimes in 2021 were scams
Group-IB shares its analysis of the landscape of the most widespread cyber threat in the world: scams. Accounting for 57% of all financially motivated cybercrime, the scam …
![handshake](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100637/handshake-400x200.jpeg)
How effective are public-private partnerships?
Ninety-three percent of cyber decision-makers say public-private partnerships are vital to national defense, but only 34 percent believe they are very effective, according to …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
There is no good digital transformation without cybersecurity
Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093801/cloud-drive2-400x200.jpg)
How to eliminate the weak link in public cloud-based multi-party computation
Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102214/connected-car-400x200.jpg)
What is keeping automotive software developers up at night?
Perforce Software released the results of its annual State of Automotive Software Development survey conducted in partnership with Automotive IQ. Close to 600 automotive …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)