Help Net Security
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104856/connection-400x200.jpg)
IT operators see promise in DevOps and new tech
A new Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation …
![geometry](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103804/geometry-400x200.jpg)
Week in review: macOS security, Segway vulns, and the SOC of the future
Here’s an overview of some of last week’s most interesting news and articles: The future of macOS security: Baked-in protection and third-party tools Anyone in the …
![Black Hat](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113350/black_hat2-400x200.jpg)
Qualys at Black Hat USA 2017: Best practices and case study presentations
There will be no lack of interesting content from Qualys at Black Hat next week. Depending on you interests, you might want to make time for some of these talks and …
![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111014/firefighters-400x200.jpg)
Companies unprepared to measure incident response
Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103558/world-hand-400x200.jpg)
Destruction of Service attacks could shut down organizations for good
The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of …
![User](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103606/user-center-400x200.jpg)
Every organization is only one click away from a potential compromise
Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105302/eye-400x200.jpg)
Assessing the habits and tactics of organized credit card fraud gangs
By analyzing hundreds of criminal forums, Digital Shadows discovered a new trend in the form of remote learning ‘schools’. Available to Russian speakers only, these six-week …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
How healthcare IT decision makers approach IoT security
More than 90% of healthcare IT networks have IoT devices connected to them. Over 70% of IT departments believe that the traditional security solutions used to secure laptops …
![Segway miniPRO](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103611/minipro_white-400x200.jpg)
Critical security vulnerabilities enable full control of the Segway miniPRO electric scooter
New IOActive research exposes critical security vulnerabilities found in the Segway miniPRO electric scooter. If exploited, an attacker could bypass safety systems and …
![transformation](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110303/transformation-400x200.jpg)
Organizations seeking way to balance development agility with application security
A new DigiCert survey reveals that 98 percent of enterprises integrating their security teams into their existing DevOps methodologies. Or, at least they’re trying to. Their …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105157/hand-400x200.jpeg)
Two Iranians charged with hacking, stealing US missile design software
Two Iranians are accused of hacking of a US software company and the theft of missile design software restricted from export from the US without a license. Mohammed Reza …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105805/cloud-400x200.jpg)
Many businesses spend more than $100,000 annually on additional cloud security features
Businesses prefer storing data in the cloud but plan to invest in extra security precautions, according to B2B ratings and reviews firm Clutch. Nearly 70% of businesses on the …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage