Help Net Security
Could an Equifax-sized data breach happen again?
Many global financial services organizations are targeted by sophisticated cyberattackers in an attempt to steal critical data and personally-identifiable information (PII), …
Endpoint security automation a top priority for IT pros
A new SANS Institute report found that automating endpoint detection and response processes is the top priority for IT professionals trying to put actionable controls around …
Major trends in app development, agile/DevOps maturity, and low-code adoption
Digital transformation dominates business strategy today, which is why web and mobile development demand is booming. Moreover, speed and agility are more important than ever …
Disruptive technologies in fintech to watch
Juniper Research has revealed the top 10 technologies set to disrupt the fintech industry in 2018 and 2019. New research found a wealth of positive changes stemming from …
Execs don’t believe their companies learn the right lessons in cybersecurity
A majority of executives around the world feel their organizations can do better when it comes to learning from their past cyber mistakes, according to the results of a newly …
Employee negligence still poses major security concerns
With one-third of working adults in the U.S. admitting to potentially risky behavior at work, employee negligence poses major security concerns for U.S. businesses, according …
3,000+ mobile apps leaking data from unsecured Firebase databases
Appthority published research on its discovery of a new HospitalGown threat variant that occurs when app developers fail to require authentication to Google Firebase …
Visibility across the digital experience is critical to manage it successfully
Riverbed found that 99% of business decision makers agree that optimizing digital performance is essential to business performance, and 98% agree that digital, including the …
CyberMap: Live map of Israel’s cybersecurity ecosystem
During CyberWeek 2018, YL Ventures launched CyberMap, the first live map of Israel’s cybersecurity ecosystem. The live landscape enables interactive filtering based on: …
Early detection of compromised credentials can greatly reduce impact of attacks
According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …
Global IoT tech spending to reach $1.2 trillion in 2022
IDC forecasts IoT spending will experience a compound annual growth rate (CAGR) of 13.6% over the 2017-2022 forecast period and reach $1.2 trillion in 2022. The forecast is …
F-Secure acquires MWR InfoSecurity
F-Secure has signed an agreement to acquire all the outstanding shares of MWR InfoSecurity, a privately held cyber security company operating globally from its main offices in …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance