Help Net Security
Whitepaper: Managing users and authentication with on-premises Active Directory for O365
This whitepaper is no longer available. The move to Office 365 (O365) requires IT departments to make some tough decisions regarding how and where to manage users and …
Cybercriminals will gravitate to criminal activity that maximizes their profit
McAfee released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware, and other threats in Q1 2018. McAfee Labs saw on average …
91% of critical incidents involve known, legitimate binaries like PowerShell
Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …
Mobile is the new frontier for malicious bots
Distil Networks analyzed over 100 million mobile devices on its networks. The findings suggest that sophisticated cybercriminals and bot operators now implement a new …
Data guides the new security perimeter
A recent Kaspersky Lab report finds data breaches now cost enterprises more than $1.2 million. The report also finds that the success of digital transformation projects are …
Confidence wavers in face of evolving cybersecurity threats
Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …
How criminals abuse IDNs to conduct malicious activities
New research from Farsight Security examines the prevalence and distribution of IDN lookalike domain names, also called homographs, over a 12-month period with a focus on 466 …
IT chiefs keep obsolete systems running just to keep data accessible
89 per cent of IT decision makers in UK enterprises admit they are keeping old or legacy applications alive just to keep the historical data accessible, according to a new …
WPA3: Next generation of Wi-Fi security now available
Wi-Fi Alliance introduced Wi-Fi CERTIFIED WPA3, the next generation of Wi-Fi security, bringing new capabilities to enhance Wi-Fi protections in personal and enterprise …
Bot-driven credential abuse, DDoS attacks continue to rise
Cybersecurity defenders face increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced DDoS attacks, …
Managing and maintaining security in the enterprise
In the digital age, more often than not, organizations are playing defense against cybercrime. In fact, a report from Online Trust Alliance shows businesses reported 159,700 …
Digital transformation: Insight into getting it right
If digital transformation (DX) is using digital technologies to create new business models and change markets, then the journey has only just begun, according to IDC. The …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits