Help Net Security
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195728/laptop-eyes-technology-computer-400x200.jpg)
Cyber espionage topping the list of largest security concerns
20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat …
![Tech](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112143/hands-tech-400x200.jpg)
Mobile workers continually expose organizations to security risks
29 percent of organisations have already experienced either a data loss or breach as a direct result of mobile working, according to research conducted by Vanson Bourne. As …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104814/money-grow-400x200.jpg)
Worldwide infosec spending to reach $90 billion in 2017
Enterprises are transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response, according to …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
Several high risk 0-day vulnerabilities affecting SAP HANA found
Onapsis discovered several high risk vulnerabilities affecting SAP HANA platforms. If exploited, these vulnerabilities would allow an attacker, whether inside or outside the …
![truck](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104823/truck-400x200.jpg)
Will the IoT force truck stops?
“Not with a bang, but with a whimper,” that was how T.S. Eliot described how the world would end, in his 1925 poem “The Hollow Men.” Things don’t always end in …
![Biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112119/biohazard-400x200.jpg)
Top five most wanted malware families worldwide
The Hancitor downloader has surged into the top five most wanted malware families worldwide for the first time, according to Check Point. The downloader, that installs …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104827/industry-400x200.jpg)
Most security pros expect increasing attacks on Industrial Internet of Things
A new Dimensional Research survey looked at the rise of Industrial Internet of Things (IIoT) deployment in organizations, and to what extent it is expected to cause security …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104830/microsoft-400x200.jpg)
By the end of March no one will remember that Microsoft missed a Patch Tuesday
Like the weather in Minnesota, the March Patch Forecast is unpredictable at best. Be prepared for turbulent times interspersed with moments of calm. Will March Patch Tuesday …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113120/gears-400x200.jpg)
Secure operations automation: Close the gap between security and operations teams
A new voke survey of 318 participants from companies of varying sizes globally, focuses on the need to operationalize security through secure operations automation practices …
![stats](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104832/stats-400x200.jpg)
Total security appliance market shows positive growth
The total security appliance market showed positive growth in both vendor revenue and unit shipments for the fourth quarter of 2016, according to IDC. Worldwide vendor …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110607/networked-world-400x200.jpg)
Week in review: Apache servers under attack, machine leaning in infosec
Here’s an overview of some of last week’s most interesting news, podcasts and articles: The six stages of a cyber attack lifecycle High-impact cyber incidents can …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104842/idea-400x200.jpg)
How to patch your security blind spots
One of the most challenging – and interesting, and frustrating – aspects of cybersecurity is the sheer unpredictability of industry developments still to come. Sure, analyzing …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage