![CCPA](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093607/CCPA-400x200.jpg)
Do Californians use CCPA to protect their privacy?
Californians regularly opt-out of companies selling their personal information, with “Do-not-sell” being the most common CCPA right exercised, happening nearly 50% of the time …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093728/phishing1-400x200.jpg)
What are the most vulnerable departments and sectors to phishing attacks?
While cyber attackers chase down system vulnerabilities and valuable data each passing day, the business world has taken the measures against them. The latest trends and …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
eCrime campaigns outpace state-sponsored activity in first half of 2020
CrowdStrike has released an annual report that reviews intrusion trends during the first half of 2020 and provides insights into the current landscape of adversary tactics, …
![Audit](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/04145232/audit-400x200.jpg)
CISOs struggling to prep for security audits
Calendars for security and compliance audits are largely unchanged despite COVID-19, yet the pandemic is straining teams as they work remotely, according to Shujinko. …
![cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103021/cybersecurity-400x200.jpg)
Tracking global cybercrime activity and the impact on the digital economy
A LexisNexis Risk Solutions report tracks global cybercrime activity from January 2020 through June 2020. The period has seen strong transaction volume growth compared to 2019 …
![Cynet report](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/14083059/cynet-report09-400x200.png)
Report: The cybersecurity impact of COVID-19
Cybersecurity company Cynet has released a report detailing changes in cyberattacks they’ve observed across North America and Europe since the beginning of the COVID-19 …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160247/email-smoke-red-400x200.jpg)
Report: The state of email security
The state of the world in 2020 is unlike anything we have experienced before, and it’s trickled down to have an impact on the IT and security world. Download this report to …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093605/zero-400x200.jpg)
Are your domain controllers safe from Zerologon attacks?
CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft released a patch in August, has just become a huge liability …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093814/user-400x200.jpg)
Aiming for a career in cybersecurity? Now is the time to pick up new skills
The COVID-19 pandemic took most of us by surprise. Widespread shelter-in-place mandates changed how we work (and whether we can work), play, rest, shop, communicate and learn. …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27090527/ransomware-yellow-400x200.jpg)
Attacked by ransomware? Five steps to recovery
Ransomware has been noted by many as the most threatening cybersecurity risk for organizations, and it’s easy to see why: in 2019, more than 50 percent of all businesses were …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/11105012/risk-low-high-400x200.jpg)
How to enforce real-time controls based on behavior risk scoring
For decades, the traditional approach to securing digital assets has been based on using a primary set of credentials, namely a username and password. This binary model …
![Web Security for Developers](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/11160910/websecurity_developers-book-400x200.jpg)
Review: Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald, with his 20 years of experience in programming, poured his knowledge into this book to offer comprehensive information about everything a developer needs to …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege