![hands](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/18150523/hands-data-security-400x200.jpg)
It’s time for a unified approach to securing data, applications, and the edge
Organizations usually manage the security of data, applications and edge computing from disparate technologies and across different teams. That traditional approach will not …
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113147/job_hunt-400x200.jpg)
When employees leave, is your data walking out the door?
In the second quarter of 2021, American workers began resigning from their jobs at a historic rate. The “Great Resignation”, as it’s since been dubbed, has seen the U.S. set …
![2022](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090524/2022_1-hns-400x200.jpg)
How will the cybersecurity industry evolve in 2022?
The cybersecurity landscape has always been dynamic. However, this past year highlighted vulnerabilities and attack vectors that will drive trends and shape global …
![Log4j](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/15084105/log4j-hns-bw-400x200.jpg)
4 practical strategies for Log4j discovery
For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within …
![gift](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102501/gift-biohazard-400x200.jpg)
How to avoid “festive fraud” during the holiday season
The year-end holiday season is a time for celebration – a chance to decorate homes, splurge on gifts and gather with family and friends. It’s also a time when the scammers …
![ecommerce](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/05094040/ecommerce-400x200.jpg)
The retail sector needs to know when and not if it will be hacked
This year, major chains like Target and Walmart closed on Thanksgiving, which resulted in a 90.4 percent dip in visits to brick-and-mortar stores when compared to 2019. This …
![Log4j](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/10182512/log4j-hns3-400x200.jpg)
Log4Shell is a dumpster fire that should have been avoided
On Thursday, December 9, 2021, my young, Minecraft-addicted kids were still completely oblivious of the Log4j vulnerabilities in their favorite game. Then again, so was every …
![2022](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090520/2022_4-hns-400x200.jpg)
Five cybersecurity predictions for 2022 and beyond
2021 saw some of the largest and most influential cyber attacks to date. Leaders in cybersecurity have faced numerous challenges this year and are likely to experience …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27135730/ransomware_2_27082021-400x200.jpg)
Ransomware Empire: Who might blackmail your company?
The history of ransomware attacks covers slightly over 30 years. Over this modest period, cybercriminals have been relentlessly building ransomware capacities and improving …
![Log4j](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/15170309/log4j-industry-hns-400x200.jpg)
Open-source software holds the key to solving Log4Shell-like problems
Earlier this month, the existence of a critical vulnerability in Apache Log4j 2 was revealed and a PoC for it published. Dubbed Log4Shell, it’s an issue in a logging library …
![2022](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090522/2022_3-hns-400x200.jpg)
6 top cybersecurity trends from 2021 and their impact on 2022
2021 has been a wild year in the cybersecurity space. From supply chain attacks like the SolarWinds hack to the NSO Group’s spyware scandal to the Colonial Pipeline ransomware …
![Avi Bashan](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/17132924/avi_bashan_2-kovrr-400x200.jpg)
Cyber insurance trends: Insurers and insurees must adapt equally to growing threats
In this interview with Help Net Security, Avi Bashan, CTO at Kovrr, talks about cyber insurance trends and how the growing threat landscape impacted both insurers and …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?