Help Net Security
![arrow](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112324/arrow2-400x200.jpg)
Week in review: Highest paying IT certifications, emergency iOS patch, and how attackers exploit whitelists
Here’s an overview of some of last week’s most interesting news and articles: Windows 10 Creators Update will come with clearer privacy options Nearly two years …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
Threat intelligence sharing challenges: Understand the context of cyber events
A new McAfee report details the challenges facing threat intelligence sharing efforts. The growing complexity of the technology environment is a very important driver for …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Oil and gas companies’ cybersecurity strategies are evolving
Lacking enterprise-wide cyber analytics technology to monitor for cyberattacks, most oil and gas companies are not fully aware of when or even how cyberattacks might affect …
![Hybrid infrastructure services](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104611/hybrid_infrastructure_services-400x200.jpg)
Extensive shift to hybrid infrastructure services is underway
The growth of cloud and industrialized services and the decline of traditional data center outsourcing (DCO) indicate a massive shift toward hybrid infrastructure services, …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113405/bot-400x200.jpg)
Video: TinyNuke botnet explained
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
23% of security pros are blind to encrypted traffic threats
According to a Venafi survey conducted at RSA Conference 2017, 23 percent of respondents have no idea how much of their encrypted traffic is decrypted and inspected. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111143/collaboration-400x200.jpg)
Generational differences increase security risks
There are two major IT security risks that enterprises need to prepare for – Millennials and the impending General Data Protection Regulation (GDPR). A global Ponemon …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105208/alert-400x200.jpg)
Most organizations were victims of business email compromise in 2016
Nearly three quarters of corporate treasury and finance professionals said their companies were victims of payments fraud last year, according to the Association for Financial …
![IRS](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113719/irs-400x200.jpg)
Tax season security tips: Protect yourself from cybercrime
Between December 2016 and February 2017, IBM X-Force researchers saw a 6,000 percent increase in tax-related spam emails. The researchers see this increase and other factors …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194554/money-400x200.jpg)
Highest paying certifications, skills in demand revealed
Global Knowledge surveyed 14,000 IT and business professionals worldwide, and confirmed that individuals and organizations benefit from IT certification. Participants …
![smile](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105358/smile-400x200.jpg)
15 new ransomware decryption tools added to No More Ransom
Nine months after the launch of the No More Ransom (NMR) project, an ever-growing number of law enforcement and private partners have joined the initiative, allowing more …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112155/skull-400x200.jpg)
45% of large British businesses sustained a successful ransomware attack
Over a third of British businesses (36 percent) are not very confident that efforts to completely eradicate a recent ransomware attack from work systems have been successful. …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage