![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/19130114/microsoft-hand-400x200.jpg)
Microsoft vulnerabilities have grave implications for organizations of all sizes
Microsoft software products are a connective tissue of many organizations, from online documents (creating, sharing, storing), to email and calendaring, to the operating …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
Extracting value from the interconnected network of risk management
From the CISO to the SOC operator, defenders struggle to maintain complete situational awareness. Holistic approaches to risk management require the implementation of a …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111221/tools-400x200.jpg)
From DDoS to bots and everything in between: Preparing for the new and improved attacker toolbox
A quick glance at global headlines shows a new breach, ransomware, DDoS, or bot attack on a near-daily basis. Orchestrating these attacks and selling hacking tools has become …
![application](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27101818/application-blue-400x200.jpg)
The threats of modern application architecture are closer than they appear
Modern applications and software have evolved as the transition to the cloud was accelerated by widespread digital transformation, as enterprises of all sizes made heavy …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092913/keys-400x200.jpg)
EU key management in 2022
It was reported that the private key used to sign EU Digital Covid certificates (aka “vaccine passports”) was leaked and circulated on messaging apps and online data breach …
![shopping](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105726/shopping_cart-400x200.jpg)
Secure transactions top retailers’ wish lists this holiday season
We are amid the busiest retail season of the year, with U.S. retail sales expected to grow 10.5% to a record $859 billion this holiday season compared to 2020. The number of …
![Jason R.C. Nurse](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/06092225/dr_jason_r_c-nurse_2-university_of_kent-400x200.jpg)
Adapting higher education to address the cybersecurity skills shortage
In this Help Net Security interview, Dr. Jason R.C. Nurse, Associate Professor in Cyber Security in the School of Computing and the Institute of Cyber Security for Society …
![industrial robot](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104454/composing-1917694_1920-400x200.jpg)
Making robotics security a top priority
Competition in the industrial robotics market is heating up, with worldwide investment expected to reach $210 billion by 2025 – more than double the amount in 2020. …
![2022](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090526/2022_2-hns-400x200.jpg)
2022 and the threat landscape: The top 5 future cybersecurity challenges
Digital adoption has rapidly accelerated and as a result, the threat surface has also expanded. As we look ahead to 2022, there will be new and evolving cybersecurity …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
Major trends in online identity verification for 2022
As more of our lives move online, we expect identity fraud attempts to continue apace. Fortunately, technology is still one step ahead. While some trends may seem bleak, there …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094422/magnify-inspect1-400x200.jpg)
The importance of vulnerability management for your organization
Everyone is familiar with home burglaries. Criminals case a house looking for easy access through open windows, unlocked doors, open garages, and the like. Hackers take the …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
How phishing kits are enabling a new legion of pro phishers
Some cybercriminals are motivated by political ideals, others by malice or mischief, but most are only interested in cold, hard cash. To ensure their criminal endeavors are …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?