Help Net Security

Five things CIOs can do as IoT adoption turns into a nightmare
There is no doubt that IoT technology has tremendous potential to improve outcomes for customers and also deliver significant business outcomes. As businesses are increasing …

How enterprises must prepare for the tech generation
With fall in full swing, HR departments are being flooded with resumes from new graduates looking to enter the workforce. But this year’s crop of new talent has some key …

Worldwide spending on digital transformation to reach $1.3 trillion in 2018
Worldwide spending on digital transformation (DX) technologies (hardware, software, and services) is expected to be nearly $1.3 trillion in 2018, an increase of 16.8% over the …

Week in review: Keylogger in HP laptops, ICS-tailored malware, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Keylogger found in Synaptics driver on HP laptops For the second time this year, a …

Our smart future and the threat of cyber-kinetic attacks
A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure …

Consumers are ready to say goodbye to passwords
A new survey of 1,000 Americans exploring awareness and perceptions of biometric authentication confirms that consumers continue to have a strong interest in new biometric …

Examining attitudes towards confidential data
Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of …

CLTRe join the race to be crowned as a Tech Trailblazer
CLTRe have been selected as a finalist in the Firestarter Trailblazer category in the Tech Trailblazers Awards. The shortlists have been selected by a panel of leading IT …

(IN)SECURE Magazine issue 56 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 56 has been released today. Table of contents How …

Preventing good containers from going bad
Containers go bad everyday, and often without warning. All it takes is one CVE impacting an image, and now all containers deployed using this image are at an increased level …

Complex regulations and sophisticated cyberattacks inflate non-compliance costs
The cost of non-compliance has significantly increased over the past few years, and the issue could grow more serious. 90 percent of organizations believe that compliance with …

Script-based attacks and overall malware on the rise
Research revealed massive increases in scripting attacks and overall malware attempts against midsize companies throughout Q3 2017. In fact, WatchGuard Technologies found that …