Help Net Security
Insider threats continue to dominate
Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider …
Continuous Diagnostics and Mitigation capability requirements need re-prioritization
There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …
Mobile apps left vulnerable for months
McAfee Labs researchers found that mobile app providers have been slow to address the most basic SSL vulnerabilities: improper digital certificate chain validation. In …
How important is the critical information infrastructure?
ENISA issued methodologies for the identification of Critical Information Infrastructure (CII) services in communication networks. This study provides state of the art …
96% say ISO 27001 is important for improving security defenses
Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It …
Is the Internet hiding a crime wave?
The U.S. crime rate continues to fall, according to the latest FBI’s release based on Uniform Crime Reporting from police departments, but researchers say those numbers, …
Lack of trust is affecting how consumers use the Internet
68% of US smartphone users are concerned about having their activity tracked to serve them targeted ads, suggesting that most smartphone users are uncomfortable with the idea …
Concerns around endpoint security
The overwhelming majority of information security professionals believe end users are their biggest security headache, largely due to their tendency to click on suspicious and …
Week in review: Gemalto SIM heist, Lenovo’s Superfish blunder, cyber spies compromising disk firmware
Here’s an overview of some of last week’s most interesting news and articles: Google relaxes its rigid 90-day bug disclosure period Google has announced that its …
Don’t wait until you’re attacked to take cybersecurity seriously
CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …
How cybercriminals hack our brains
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …
Cyber readiness across government and critical infrastructure industries
While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)