Category: HelpnetSecurity

Only 26% of Europe's top companies earn a high rating for cybersecurity
06
Jan
2025

Only 26% of Europe’s top companies earn a high rating for cybersecurity

With the EU’s Digital Operational Resilience Act (DORA) deadline approaching on 17th January, 2025, Europe’s top 100 companies face an…

Is healthcare cybersecurity in critical condition?
06
Jan
2025

Is healthcare cybersecurity in critical condition?

This article highlights key findings and trends in healthcare cybersecurity for 2024. From the rising impact of cyberattacks on patient…

Deepfakes question our ability to discern reality
03
Jan
2025

Deepfakes question our ability to discern reality

As deepfakes become increasingly sophisticated and accessible, their potential for misuse in areas such as cybercrime, misinformation campaigns, and identity…

The modern CISO is a cornerstone of organizational success
03
Jan
2025

The modern CISO is a cornerstone of organizational success

The chief information security officer (CISO) role has undergone a remarkable transformation, evolving from a purely technical position to a…

Best practices for ensuring a secure browsing environment
03
Jan
2025

Best practices for ensuring a secure browsing environment

In this Help Net Security interview, Devin Ertel, CISO at Menlo Security, discusses how innovations like AI and closer collaboration…

Every minute, 4,080 records are compromised in data breaches
03
Jan
2025

Every minute, 4,080 records are compromised in data breaches

A recent Domo report shows that the world’s internet population has reached a record high of 5.52 billion people and…

CISOs don't invest enough in code security
02
Jan
2025

CISOs don’t invest enough in code security

72% of security leaders agree that the age of AI necessitates a complete reset of how organizations approach application security,…

When risky cybersecurity behavior becomes a habit among employees
02
Jan
2025

When risky cybersecurity behavior becomes a habit among employees

While the majority of employees avoid risky behaviors, a small subset makes them a habit, posing a significant cybersecurity challenge,…

Kata Containers: Open-source container runtime, building lightweight VMs
02
Jan
2025

Kata Containers: Open-source container runtime, building lightweight VMs

Kata Containers is an open-source project dedicated to creating a secure container runtime that combines the performance and simplicity of…

The real cost of data breaches for businesses
02
Jan
2025

The real cost of data breaches for businesses

This article presents key findings from 2024 reports on data breaches. Breaches are taking longer to resolve and are becoming…

Regulations, security, and remote work: Why network outsourcing is booming
31
Dec
2024

Regulations, security, and remote work: Why network outsourcing is booming

A growing number of enterprises in the US are adopting managed network services to support AI and other new technologies…

The state of cybersecurity and IT talent shortages
31
Dec
2024

The state of cybersecurity and IT talent shortages

This article highlights key findings and trends in the 2024 IT and cybersecurity skills gap, from the shortage of cybersecurity…