Help Net Security
NTODefend now more effectively blocks application vulnerabilities
NT OBJECTives announced that its NTODefend solution now blocks application vulnerabilities by approximately 30% more than the previous version. As a result, NTODefend’s …
Five charged with stealing 160+ million credit card numbers
A federal indictment made public in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole …
The impact of weak threat intelligence on organizations
A new Ponemon Institute study, which includes a survey of more than 700 respondents from 378 enterprises, defines what “live threat intelligence” is; how global …
IBM unveils software to identify and predict security risk
IBM announced an integrated security intelligence solution that helps organizations identify key vulnerabilities in real-time. QRadar Vulnerability Manager gives security …
Cyber security is central to long-term economic growth
An increase in attacks on corporate websites should focus attention on the actions businesses should take to reduce the impact of cybercrime. The word of caution comes in the …
Record malware growth in China, Ukraine and Saudi Arabia
51,000 new mobile malware threats were identified in the first half of 2013, infecting an estimated 21 million mobile devices, according to NQ Mobile. Highlights of report …
Economic growth and national security are at risk
FTSE 350 companies that are vital to Britain’s economic growth, and crucial to national security, are leaking data that can be used by cyber attackers to gain control of …
Bit9 Introduces enterprise Mac security
Business users are driving demand for Macs across the enterprise. Until now, the few enterprise security products available for the Mac were dependent on malware signatures …
Key security metrics revealed
A new Ponemon Institute study examined the key risk-based security metrics IT security managers used most frequently to gauge the effectiveness of their organizations’ …
A historical overview of the cyberattack landscape
Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially. …
The rise of sophisticated malware
A recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an …
Executives lack confidence in their cyber security
More than two-thirds of executives are concerned their companies will not be able to stop such threats, and one in five say their biggest concern is not knowing whether an …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation