Help Net Security
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103651/idea-400x200.jpg)
Don’t let cybercrime hold your innovation to ransom
When things break, our natural instinct is to look for someone to blame. Why? Because nothing happens by accident. It’s either done on purpose, a casualty of neglect or lack …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104620/email-400x200.jpg)
Enterprises face 3,680 potential phishing emails each week
GreatHorn analyzed more than 3.5 terabytes of data – over 373 million corporate emails – to gain insights into the sheer volume of email threats facing enterprises …
![dark web mapped](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113223/dark-web-mapped-400x200.jpg)
Security analytics and operations are becoming more difficult
A new Enterprise Strategy Group (ESG) study, which involved a survey of more than 400 IT and cybersecurity professionals, found that 72 percent feel cybersecurity analytics …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
The future of payments: sensor fingerprinting, facial recognition, retinal scanning and voice control
Viewpost surveyed a cross-section of 1,000 U.S.-based consumers, finding that overall, 80 percent of Americans are in support of payments technologies and currencies, …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105528/industry-1-400x200.jpg)
What will it take to improve the ICS patch process?
While regular patching is indisputably good advice for IT networks, one of the main takeaways from the Petya and WannaCry attacks is that a lot of companies don’t do it. And …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103704/connection-400x200.jpg)
Event-driven architecture to become essential skill
Achieving broad competence in event-driven IT will be a top three priority for the majority of global enterprise CIOs by 2020, according to Gartner. Defining an event-centric …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Telecoms don’t protect users from government overreach
The data stored on our mobile phones, laptops, and especially our online services can, when aggregated, paint a detailed picture of our lives—where we go, who we see, what we …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
Getting the most out of your SIEM investment
Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event management (SIEM) solutions. These …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103720/tunnel-400x200.jpeg)
Businesses overconfident about keeping attackers at bay
Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT professionals still believe perimeter …
![London](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195027/london-400x200.jpg)
UK executives badly informed about where data is stored compared to other countries
When it comes to data compliance matters, one in five business decision makers within the UK admit they do not know which compliance regulations their company is subject to, …
![Abstract 7](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105323/spore-400x200.jpg)
Week in review: Windows 10 against crypto ransomware, satellite phone comms decryption
Here’s an overview of some of last week’s most interesting news and articles: 66% of US law firms reported a breach in 2016 The majority of US-based law firms are …
![Kodi](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104252/Kodi-devices-400x200.jpg)
Why Kodi boxes can pose a serious malware threat
When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the ease by which they could watch “over the …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage