Help Net Security
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105427/abstract-400x200.jpg)
Open Security Controller: Security service orchestration for multi-cloud environments
The Linux Foundation launched the Open Security Controller project, an open source project focused on centralizing security services orchestration for multi-cloud …
Illegal Bitcoin exchange operator gets 66-month prison sentence
Anthony Murgio, the operator of the Coin.mx Bitcoin exchange, has been sentenced to 66 months in prison for processing over $10 million in illegal Bitcoin transactions. He has …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
What makes a good security analyst: The character traits you need
Of all the skillsets IT decision-makers are looking to hire for, cybersecurity is easily the most challenging. According to Global Knowledge’s 10th annual IT Skills and Salary …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103815/money-400x200.jpeg)
Organizations award hackers up to $900,000 a year in bug bounties
A new HackerOne report examines over 800 hacker-powered programs from organizations including Airbnb, GitHub, General Motors, Intel, Lufthansa, Nintendo, U.S. Department of …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104216/phishing-400x200.jpg)
Criminalization of DNS for phishing continues to advance
Cybercriminals have been shifting their tactics markedly, by registering more and more domain names, rather using web servers and domains they have hacked into. These …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105406/face-400x200.jpg)
Organizations are intimidated by global privacy and data security regulations
While companies generally are aware of and intimidated by global privacy and data security regulations, they fail to properly understand and address necessary organizational …
![Magazine 54](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103826/magazine54-news-400x200.jpg)
(IN)SECURE Magazine issue 54 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 54 has been released today. Table of contents The …
![scalable](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103833/scalable-400x200.jpg)
Making enterprise content management secure and scalable
Content is one of the most valuable commodities that any business owns. It’s the key driver of customer interactions, the foundation of core business processes, and it helps …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103831/linux-400x200.jpg)
Cybersecurity battleground shifting to Linux and web servers
Despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017. This attack pattern …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
With ransomware, pay up if you want to keep paying
A hospital CEO is contacted in the middle of the night with a dire warning. Hackers have taken control of computer systems used for patient care, CT scans, and lab work. The …
![city](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110636/city-400x200.jpg)
Most businesses will not put off cloud adoption because of security concerns
Businesses are pressing ahead with their digital transformation plans, despite fears of being hit by a cyber attack or data protection regulations. This is according to a new …
![fractal generic center evolution spread](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103850/fracta-generic-400x200.jpg)
Week in review: Evaluating AI-based cyber security systems, how CIA hit air-gapped computers
Here’s an overview of some of last week’s most interesting news and articles: How the CIA gained access to air-gapped computers A new WikiLeaks release of …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage