human error
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/19165750/vulnerability-1400-400x200.jpg)
Low code, high stakes: Addressing SQL injection
Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s. Due to various factors, they remain the third most common source …
![Jim Dolce](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05134559/jim_dolce-2-lookout-400x200.webp)
Security and privacy strategies for CISOs in a mobile-first world
In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must …
![eyes](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20164642/eyes-400x200.jpg)
Avoiding the cybersecurity blame game
Cyber risk management has many components. Those who do it well will conduct comprehensive risk assessments, enact well-documented and well-communicated processes and …
![human risk](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29221250/human-risk-400x200.webp)
Why SMBs are facing significant security, business risks
In this Help Net Security video, Alex Cox, Director of Threat Intelligence at LastPass, discusses how human factors are getting in the way while SMB leaders report investing …
![breach](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/07153034/breach-attack-1400-400x200.jpg)
Stopping security breaches by managing AppSec posture
Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16162224/insider_threat-1400-400x200.jpg)
Fighting insider threats is tricky but essential work
Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats (75%). But which of the two is a bigger …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07131850/lock-texture-400x200.jpg)
Out with the old and in with the improved: MFA needs a revamp
From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances, cybercriminals repeatedly …
![software bug](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/08155002/software_bug-400x200.jpg)
Researchers develop technique to prevent software bugs
A team of computer scientists led by the University of Massachusetts Amherst recently announced a new method for automatically generating whole proofs that can be used to …
![Jayson E. Street](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19122041/jayson_e_street-2-secure_yeti-400x200.jpg)
Social engineer reveals effective tricks for real-world intrusions
In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/08121851/ai-robot-400x200.jpg)
Using AI and automation to manage human cyber risk
Despite advanced security protocols, many cybersecurity incidents are still caused by employee actions. In this Help Net Security video, John Scott, Lead Cybersecurity …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/24130334/cyber_insurance-2-400x200.jpg)
Understand the fine print of your cyber insurance policies
A significant gap is emerging between insurance providers, as organizations skip the fine print and seek affordable and comprehensive coverage, potentially putting them in a …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094044/fire-400x200.jpg)
30% of phishing threats involve newly registered domains
Phishing remains the most dominant and fastest growing internet crime, largely due to the ubiquity of email and the ceaseless issue of human error that is preyed upon by …