Help Net Security

Global business spend on cybersecurity to grow 33% over the next 4 years
New data from Juniper Research has found that global business spend on cybersecurity solutions will grow by 33% over the next 4 years, reaching $134 billion annually by 2022. …

Four wireless standards hackers will target after Wi-Fi
When any new communication medium for sharing information emerges, it’s often quickly followed by those committed to hacking it. This natural progression is …

Healthcare industry: Attacks outpacing investments in personnel, education and resources
Recognizing that healthcare organizations are facing constant cyber attacks, the 2018 Impact of Cyber Insecurity on Healthcare Organizations study examines the myriad of …

Web security and high availability for blockchain-based businesses and financial institutions from Incapsula
Blockchain and cryptocurrency news was all the rage last year and it looks like that trend will continue to rise in 2018. Blockchain technology is on its way to being adopted …

Record surges in healthcare attacks, fileless malware, cryptocurrency mining
During Q4 2017, McAfee Labs saw on average eight new threat samples per second, and the increasing use of fileless malware attacks leveraging Microsoft PowerShell. The Q4 …

Global SOC maturity improves, yet some still operate with serious gaps in security
Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient …

Organizations are not doing enough to protect data privacy
In today’s data-driven society, privacy, security and trust are more vital and intertwined than ever before. But many organisations are not doing all they can to protect data …

March Patch Tuesday forecast: In like a lamb, out like a lion
It’s March and up here in the Midwest we have a saying for this early spring month, “In like a lamb, out like a lion.” Often the month of March comes with a …

Week in review: New LTE attacks, Android P security, backdooring connected cars
Here’s an overview of some of last week’s most interesting news and articles: How to improve your security infrastructure when you’re on a budget You may not be …

Infrastructure security: Don’t just sit there, do something!
Around 4am on March 28, 1979, things started to go badly wrong deep inside the bowels of reactor number two at Three Mile Island. Routine maintenance to clear a blockage …

Not all who pay a ransom successfully recover their compromised data
A new report by the CyberEdge Group found that 55 percent of responding organizations were compromised by ransomware in 2017, down from 61 percent in 2016. How victims …

Cloud access management is integral to adopting cloud applications
The proliferation of cloud applications and use of a disparate range of devices within businesses has led to 64% of IT leaders admitting that their security teams are …