Help Net Security
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111725/brain-400x200.jpg)
Modern security programs: Artificial intelligence and machine learning
A new research report by Carbon Black aggregates insight from more than 400 interviews with leading cybersecurity researchers who discussed non-malware attacks, artificial …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111237/qualys-400x200.jpg)
Don’t forget to pack security for the journey to the cloud
When you move workloads to public cloud platforms, you offload many tasks on the cloud provider, but don’t fall for the misconception that you’re entirely off the hook with …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
Website Performance Bootcamp: Quiz-based training course
The Website Performance Bootcamp is an online portal that provides quiz-based technical training in the field of website acceleration and content optimization. Whether …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195244/eye-400x200.jpg)
1.37 billion data records compromised globally in 2016
Gemalto’s Breach Level Index revealed that 1,792 data breaches led to 1.37 billion data records being compromised worldwide during 2016, an increase of 86% compared to …
![HITBSecConf](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113642/hitb-2016ams-400x200.png)
Researchers to present new software and hardware vulnerabilities at HITB Amsterdam
Users assume the underlying hardware and software system, mobile antivirus, password managers and encryption technology will protect them from malicious attacks on their …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195157/user-400x200.jpg)
Understanding Europe’s insider threats
35% of employees across the UK, France, Germany and Italy admit to have been involved in a security breach, presenting regional CISOs with a significant challenge when it …
![emergency](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110645/emergency-400x200.jpg)
IT pros spend too much time handling emergencies
A 1E survey of 1,014 IT professionals, who together manage more than 21 million endpoints globally, centered on unplanned activities – how often they occur, what types are …
![cyber](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104649/cyber2-400x200.jpg)
Like it or not, “cyber” is a shorthand for all things infosec
We have lost the cyber war. No, not that cyber war. Maybe war of words is a better way to put it. Whether we like it or not, cyber has become the default way for everyone else …
![hard drive](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112219/harddrive-400x200.jpg)
Used devices are a treasure trove of personally identifiable information
40 percent of hard drives, mobile phones and tablets resold in publicly-available resale channels contain personally identifiable information (PII), according to an analysis …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110326/puzzle-400x200.jpg)
A new approach is needed in the battle against cyber attacks
How do you search for something that’s invisible? An increase in the sophistication of cyber attacks means that it takes an average of 146 days before a corporate hack is …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Week in review: Leaking LastPass extensions, 300+ hackable Cisco switches
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Malware posing as Siemens PLC software is hitting industrial environments …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195100/money-400x200.jpg)
GoDaddy acquires Sucuri
GoDaddy has entered into an agreement to purchase Sucuri, a provider of website security products and services. Financial details of the transaction were not disclosed. Sucuri …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage