![vote](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111919/vote-400x200.jpg)
ENISA provides recommendations to improve the cybersecurity of EU electoral processes
In the context of the upcoming elections for the European Parliament, the EU Agency for Cybersecurity ENISA published an opinion paper on the cybersecurity of elections and …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103351/businessman-400x200.jpg)
Phishing, software supply chain attacks greatest threats for businesses
Attackers continue to use phishing as a preferred attack method, but have been forced to adapt their approach as anti-phishing tools and techniques are becoming more …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
Blocking compromised passwords from the Collection leaks
It all started with Collection #1, a monster breach dubbed as the biggest data dump in history with its 773 million unique email addresses, and 22 million unique passwords. …
![analyze](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095209/analyze-400x200.jpg)
CISO’s guide to an effective post-incident board report
A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the …
![shadow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194957/shadow-400x200.jpg)
Prevent shadow IT: Companies need security covering multiple communication vectors
There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …
![NGINX](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095223/nginx-400x200.jpg)
Building security into cloud native apps with NGINX
Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and …
![NIST Cybersecurity Framework](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095235/nist-framework-anniversary-400x200.jpg)
NIST Cybersecurity Framework: Five years later
Five years after the release of the Framework for Improving Critical Infrastructure Cybersecurity, organizations across all sectors of the economy are creatively deploying …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
SMBs spending a day each week dealing with cybersecurity issues
Almost half of UK small to medium-sized businesses (SMBs) believe a cyberattack would put their business at risk of closure, and 48 per cent of businesses report they have had …
![complex](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100143/complex-1-400x200.jpg)
Security wellness takes more than a fad diet
Every year, millions of people make the same New Year’s resolution: to lose weight and improve health. But by February, a mere thirty days or so into the year, stats show 75 …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102012/hand_computer-400x200.jpeg)
What do successful pentesting attacks have in common?
In external penetration testing undertaken for corporate clients in industrial, financial, and transport verticals in 2018, Positive Technologies found that, at the vast …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105327/vulnerability-400x200.jpg)
Lookalike domains: Artificial intelligence may come to the rescue
In the world of network security, hackers often use lookalike domains to trick users to unintended and unwanted web sites, to deliver malicious software into or to send data …
![Blocks](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101432/blocks-400x200.jpg)
5 reasons why asset management is a hot topic
Sometimes buzzwords are good predictors of what organizations see as priorities in a given year. If you surveyed both the revenue-generating and security functions of …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?