Help Net Security
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
There’s a growing disconnect between data privacy expectations and reality
There is a growing disconnect between how companies capitalize on customer data and how consumers expect their data to be used, according to a global online survey …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
Average DDoS attack volumes grew by 194% in 12 months
The volume and complexity of DDoS attacks continued to grow in Europe during the final quarter of 2018, according to Link11. While Link11’s Security Operations Center (LSOC) …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110607/networked-world-400x200.jpg)
Week in review: Vaporworms, 8 months of GDPR, penetration testing effectiveness
Here’s an overview of some of last week’s most interesting news and articles: Why vaporworms might be the scourge of 2019 Not too long ago, the WatchGuard Threat …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100620/patch-400x200.jpg)
Mild to medium volume expected for February 2019 Patch Tuesday
If you look at the recent Patch Tuesday lineups, we have seen the usual updates for the Microsoft Windows OS, browsers, and Office. In the last two months we have seen updates …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
DevOps and DevSecOps developments to watch in 2019
Some predictions are more accurate than others. Last year, I was sure that serverless would finally overtake containers—but then 2018 turned out to be the year of Kubernetes. …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100537/cloud-1-400x200.jpg)
Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption
65 percent of infosecurity professionals would like to store object data in the cloud, but 47 percent either don’t believe or are not sure if data in the cloud is as …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102012/hand_computer-400x200.jpeg)
What do successful pentesting attacks have in common?
In external penetration testing undertaken for corporate clients in industrial, financial, and transport verticals in 2018, Positive Technologies found that, at the vast …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105327/vulnerability-400x200.jpg)
Lookalike domains: Artificial intelligence may come to the rescue
In the world of network security, hackers often use lookalike domains to trick users to unintended and unwanted web sites, to deliver malicious software into or to send data …
![Blocks](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101432/blocks-400x200.jpg)
5 reasons why asset management is a hot topic
Sometimes buzzwords are good predictors of what organizations see as priorities in a given year. If you surveyed both the revenue-generating and security functions of …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
The impact of cyber-enabled economic warfare escalation
The results of a tabletop exercise on cyber-enabled economic warfare find that when a large-scale destructive cyberattack occurs, the United States and the private sector must …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101457/biohazard-400x200.jpg)
Why vaporworms might be the scourge of 2019
Not too long ago, the WatchGuard Threat Lab predicted the emergence of vaporworms as a major new cyber threat that will affect organizations of all sizes in 2019. We coined …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110851/brain-400x200.jpg)
AI won’t solve all of our cybersecurity problems
AI is already supporting businesses with tasks ranging from determining marketing strategies, to driverless cars, to providing personalized film and music recommendations. And …
Featured news
Sponsored
Don't miss
- Review: Action1 – Simple and powerful patch management
- Securing remote access to mission-critical OT assets
- Coding practices: The role of secure programming languages
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)