Help Net Security
The problem with security shortcuts
A combination of irresponsible user behavior and weaknesses in the protection of networks could create more risks for data breaches during the holiday period than at any other …
Web Application Firewall revenue to reach $777.3 million in 2018
The global Web application firewall (WAF) market was once primarily driven by regulatory requirements to protect Web applications and the sensitive customer data they collect. …
HIPAA security compliance: How risk tolerant are you?
At the heart of HIPAA lies a set of core security tenets for which every affected organization is responsible. These fundamentals are absolutely non-negotiable – but the …
Week in review: POODLE targeting TLS, insider threats, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles: Software security in a market for lemons Programming has always been …
FIDO Alliance prepares for industry adoption of strong authentication in 2015
The FIDO (Fast IDentity Online) Alliance published final 1.0 drafts of its two specifications – Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F). …
Insider threats 101: The threat within
Recent events – both in the United States and in Japan – have forced IT administrators everywhere to reevaluate the possibility of insider threats. Because of …
Why now is the time for enterprises to implement context-based authentication
Security and efficiency are constant concerns in enterprise IT. The popularity of BYOD has been a boon for improved productivity and collaboration, but it has also created a …
Cloud security: Do you know where your data is?
The rapid move towards virtualization and cloud infrastructure is delivering vast benefits for many organizations. In fact, Gartner has estimated that by 2016, 80% of server …
Big Data analytics to the rescue
In the battle against cyber criminals, the good guys have suffered some heavy losses. We’ve all heard the horror stories about major retailers losing tens of millions of …
Do senior executives understand their role in data security?
There are four distinct groups of organization when it comes to measuring how much value senior executives place on their company’s data and how well that data is …
10 strategies to protect patient information
Data breaches, lawsuits, medical identity theft—all cringe-worthy realities—and the threats to patient data have never been greater. With cybercrime targeting healthcare, …
Security deficiencies that increase data breach risk
Many businesses still struggle with information security deficiencies and common security weaknesses that can elevate their risk of data breaches. Based on a global survey of …
Featured news
Resources
Don't miss
- TeamPCP’s attack spree slows, but threat escalates with ransomware pivot
- Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
- Why risk alone doesn’t get you to yes
- ShipSec Studio brings open-source workflow orchestration to security operations
- Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)