Help Net Security
Compromised credentials in enterprise cloud apps
A new Netskope report shows a continued increase in cloud app usage across enterprises, as well as the high volume at which files are being shared outside of a given …
The coming shift in security
Vendors continue to trumpet new platforms as the best way to improve enterprise-level security. Flashy spinning visualizations, added scalability and the meaningless …
Top fraud and corruption trends
Highlighted by a dramatic rise in cyber security risk across all industries, EY Fraud Investigation & Dispute Services (FIDS) unveiled its top fraud and corruption trends …
Top 3 reasons businesses should prioritize web security
2014 was a year of high-profile hacks for businesses around the world. From The Home Depot breach to the recent Sony data leak, it seemed like as soon as one data breach was …
The one compliance lesson you need to learn
We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. At the same time, we have seen an influx …
NETGEAR ReadyNAS 200 enables data protection
NETGEAR is expanding its family of NAS devices with the performance-driven ReadyNAS 200 Series for home and home office networks. ReadyNAS 200 transfers files up to an amazing …
Kensington unveils thinnest security lock for ultrabooks and tablets
Kensington announced the MiniSaver Mobile Lock, the thinnest security lock system with the Kensington mini security slot technology – for use on ultra-thin mobile …
Toshiba releases FlashAir III wireless SD card
Toshiba introduced the FlashAir III wireless SD card, a third generation memory card that serves as its own wireless LAN access point, allowing users to share images, videos …
Rails security scanner Brakeman 3.0.0 released
Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at …
Four cyber security risks not to be taken for granted
It’s pretty difficult to make information security predictions, and even more difficult to verify them afterwards: we can only judge the effectiveness of information …
Identity theft for dummies
It happened again. Checking into the hotel, I was asked if I can provide my credit card to cover additional expenses (not unusual). However, the receptionist simply wrote my …
Number of cyber attacks on retailers drops by half
Despite an 50 percent decline in the number of attacks against U.S. retailers, the number of records stolen from them remains at near record highs. IBM Security researchers …
Featured news
Resources
Don't miss
- 10 data security companies to watch in 2026
- Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
- China-linked Salt Typhoon hackers attempt to infiltrate European telco
- Most AI privacy research looks the wrong way
- Why ex-military professionals are a good fit for cybersecurity