Help Net Security
Are endpoints the most vulnerable part of the network?
Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …
Acunetix offers free network security scan
Acunetix is offering 10,000 free network security scans with Acunetix Online Vulnerability Scanner in a bid to make it easier for businesses to take control of their network …
Seagate delivers five new NAS products
Seagate announced five NAS products in a range of capacities from 2TB to 30TB and performance suited for the home office to small businesses with up to 50 employees. The …
How hackers get in: Lessons from a network security audit
Data security is a defining challenge for our time, yet many businesses and other organizations remain under-prepared. The problem stems from numerous sources: lack of concern …
Exposing the insecurity of hotel safes
Travel documents, cash, mobile devices, cameras, jewellery and company documents – on holiday or on a business trip, tourists and business people alike often carry …
63% of businesses don’t encrypt credit cards
In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known …
Pushdo Trojan infects 11,000 systems in 24 hours
Bitdefender has discovered that a new variant of the Trojan component, Pushdo, has emerged. 77 machines have been infected in the UK via the botnet in the past 24 hours, with …
New IP-based wireless networking protocol created
Recognizing the need for a better way to connect products in the home, seven companies announced that they’ve joined forces to develop Thread, a new IP-based wireless …
49% of security pros think Java apps are vulnerable to attacks
In a recent poll, half of the senior IT professionals polled said their Java applications are vulnerable (32%) or very vulnerable (17%) to attacks. They cited insecure coding …
Cloud Security Alliance updates guidance documents
The Cloud Security Alliance (CSA) announced significant updates to two de facto industry standards, the Cloud Controls Matrix (CCM) Version 3.0.1 and the Consensus Assessments …
Unlocking the hidden value of information
Unstructured content accounts for 90% of all digital information. This content is locked in a variety of formats, locations, and applications made up of separate repositories, …
Oracle delivers 113 updates
Oracle’s Quarterly Critical Patch Update (CPU) is never a minor event. In April we saw 104 security issues addressed, in January it was 144. This time around we are …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits