Help Net Security
![threat hunting](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113059/threat-hunting-400x200.jpg)
Secrets of successful threat hunters and SOCs
McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113752/threat-400x200.jpg)
Expected cyber threats over the next six months
With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105016/danger-400x200.jpg)
CrowdStrike launches malware search engine
CrowdStrike launched CrowdStrike Falcon MalQuery, the first malware search and intelligence component of its CrowdStrike Falcon Search Engine for cybersecurity data. …
![Qualys CloudView](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103542/Qualys-CloudView-400x200.png)
Qualys CloudView to deliver continuous security of public cloud infrastructure
Qualys announced CloudView, a new app framework in the Qualys Cloud Platform for comprehensive and continuous protection of cloud infrastructure, delivering InfoSec and …
![Facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104156/facepalm-files-400x200.jpg)
6+ billion records exposed in data breaches in first half of 2017
There have been 2,227 publicly disclosed data compromise events since the beginning of the year through June 30th, according to Risk Based Security. While this is in keeping …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105157/hand-400x200.jpeg)
UK govt urges teenagers to apply for cyber security training programme
UK teenagers are being encouraged to register in a cyber security training programme rolled out to help the nation address the risk of a future skills shortage. The Department …
![Magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194145/magnify-400x200.jpg)
Custom code accounts for 93% of application vulnerabilities
Although third-party software libraries represent a majority of an application’s code, they account for less than seven percent of application vulnerabilities. Typically, …
![ADAC test](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113428/adac-test-400x200.jpg)
Testing the security of connected cars and IoT devices
IBM Security announced the launch of two new security testing practice areas focused on automotive security and the Internet of Things (IoT). The new services will be …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103547/general-400x200.jpg)
The future of AppSec: Stop fighting the last war
It’s a cornerstone of military doctrine: when you focus too much on the last battle you faced, you miss signs of the new battleground taking shape. The principle holds as true …
![Qualys CertView](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103545/Qualys-CertView-400x200.png)
Manage SSL/TLS certificates across IT environments with Qualys CertView
Qualys announced CertView, a new app framework in the Qualys Cloud Platform that enables customers to discover, assess and manage SSL/TLS certificates on a global scale, …
![signature](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105013/signature-400x200.jpg)
Is cyber insurance worth the paper it’s written on?
Weighing up whether you think insurance is worth it, in any situation, depends to some extent on personal experience. You can see the value of protection far more clearly if …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103552/gdpr-400x200.jpg)
As GDPR approaches, retail data breaches remain unacceptably high
Two in five retailers across the globe have experienced a data breach in the past year, according to Thales and 451 Research. The report reveals that 43 percent of retailers …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage