![Critical infrastructure](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111128/ics-400x200.jpg)
Lack of visibility plaguing ICS environments
Dragos released its report on cyber threats facing industrial organizations, naming the emergence of three new threat groups targeting ICS/OT environments, including two that …
![Rowland Corr](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/24115222/rowland_corr_2-adaptive_mobile_sec-400x200.jpg)
Leveraging mobile networks to threaten national security
In this interview with Help Net Security, Rowland Corr, Director of National Security Intelligence at AdaptiveMobile Security, explains how mobile networks can be leveraged as …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110109/danger-400x200.jpg)
Cybercrime getting more destructive, remote workers in the crosshairs
Fortinet’s threat intelligence from the second half of 2021 reveals an increase in the automation and speed of attacks demonstrating more advanced persistent cybercrime …
![endpoint protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/23100505/endpoint-protection-400x200.jpg)
Devastating breaches apparently still not enough for organizations to prioritize endpoint security
Action1 released a report based on feedback from 491 IT professionals worldwide. The study explores the extent to which organizations plan to prioritize endpoint security and …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Help Net Security: Healthcare Cybersecurity Report has been released
Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …
![Scott Best](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/17145420/scott_best_2-rambus-400x200.jpg)
How much can you trust your printer?
In this interview with Help Net Security, Scott Best, Director of anti-tamper security technology at Rambus, talks about what organizations should be aware of when it comes to …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095742/data-400x200.jpg)
To shift to data-driven security decision making: Start with the right data
We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
83% of employees continue accessing old employer’s accounts
In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to …
![dislike](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094442/dislike-400x200.jpg)
Social media attacks surged in 2021, financial institutions targeted the most
Social media as a threat channel saw a two-fold increase in attacks throughout 2021, according to a report from PhishLabs. In Q4 and throughout 2021, PhishLabs analysed …
![ENISA](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19143001/enisa-clouds-400x200.jpg)
ENISA and CERT-EU publish set of cybersecurity best practices for public and private organizations
The European Union Agency for Cybersecurity (ENISA) and CERT-EU published a joint set of cybersecurity best practices for public and private organizations in the EU. ENISA …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
Ransomware’s savage reign continues as attacks increase 105%
SonicWall released a report which details a sustained meteoric rise in ransomware with 623.3 million attacks globally. Nearly all monitored threats, cyberattacks and malicious …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100018/bomb-400x200.jpg)
Tackling supply chain security head-on
Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints