cybersecurity
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153422/email3-400x200.jpg)
How cybercriminals adapt and thrive amidst changing consumer trends
The email threat landscape is experiencing a profound transformation, adapting to new challenges and exploiting emerging vulnerabilities with speed and sophistication. In this …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094415/money-1-400x200.jpg)
Financial organizations embrace automation for enhanced security
The security performance of financial applications generally outperforms other industries, with automation, targeted security training, and scanning via Application …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
AI is transforming financial crime compliance
While 86% of compliance, operations, risk and IT professionals at banks and non-banking financial institutions (NBFIs) surveyed said they would increase spending on AI and ML …
![cybersecurity staff shortages](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/31144403/cybersecurity-staff-shortages-400x200.jpg)
Cybersecurity workforce shortages: 67% report people deficits
The global cybersecurity workforce has reached 5.5 million people, an 8.7% increase from 2022, representing 440,000 new jobs, according to ISC2. While this is the highest …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07131853/laptop-tech-400x200.jpg)
6 steps to accelerate cybersecurity incident response
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a …
![Kai Roer](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/30125220/kai_roer-2-praxis_security_labs-400x200.jpg)
How human behavior research informs security strategies
In this Help Net Security interview, Kai Roer, CEO at Praxis Security Labs, explores the theoretical underpinnings, practical implications, and the crucial role of human …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101346/patch-1-400x200.jpg)
Why legacy system patching can’t wait
The persistent neglect of patching legacy systems is plaguing critical infrastructure and industries. The consequences of such neglect can be damaging to organizations, …
![businessman computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/30135846/businessman-computer-400x200.jpg)
Cybersecurity habits and behaviors executives need to be aware of
Top executives — the employee group most targeted by threat actors — are frequently provided unfettered access to valuable data sources and networked assets, according to …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133916/target1-400x200.jpg)
Public exposure of data breaches is becoming inevitable
Ransomware incidents rising again as criminals use data exfiltration and supply chain attacks to maximize their leverage, according to Allianz. Allianz Commercial analysis of …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171236/ransomware-2-400x200.jpg)
Ransomware attacks set to break records in 2023
Ransomware attacks continue at a record-breaking pace, with Q3 2023 global ransomware attack frequency up 11% over Q2 and 95% year-over-year (YoY), according to Corvus …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11202842/network-lights-400x200.jpg)
Mainframes are around to stay, it’s time to protect them
While many organizations run their core business applications on the mainframe, IT leaders lack confidence in the effectiveness of their mainframe security compliance, …
![Java](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/26165425/java-logo-400x200.jpg)
The hidden costs of Java, and the impact of pricing changes
An overwhelming 98% of all the businesses surveyed use Java in their software applications or infrastructure, and 57% of those organizations indicate that Java is the backbone …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?