Help Net Security
The agile IT stack grows and becomes more complex
BigPanda’s annual survey evaluated the current IT monitoring landscape, including a review of the most popular tools for monitoring, deployment, and ticketing/collaboration; …
Multiple security flaws found in mainstream robotic technologies
IOActive exposed numerous vulnerabilities found in multiple home, business, and industrial robots available on the market today. The array of vulnerabilities identified in the …
Ransomware spiked 752% in new families
2016 was truly the year of online extortion. Cyber threats reached an all-time high, with ransomware and Business Email Compromise (BEC) scams gaining increased popularity …
Attackers thrive in a fluid market, while bureaucracy constrains defenders
A new global report from Intel Security and the Center for Strategic and International Studies (CSIS) reveals three categories of misaligned incentives: corporate structures …
Email and IoT security issues persist
New AT&T research shows many businesses are not effectively protecting their data. As more organizations adopt cloud architectures, traditional security protections …
With 1.2 million phishing attacks, 2016 was a success for cybercriminals
The Anti-Phishing Working Group (APWG) observed that 2016 ended as the worst year for phishing in history. The total number of phishing attacks in 2016 was 1,220,523. This …
Global cloud security market to reach $13.93 billion by 2024
The cloud infrastructure has witnessed a significant growth in recent years and its popularity can be attributed to the on-demand services, scalability and flexibility, and …
Businesses still confused about GDPR
European businesses are still unsure about GDPR – almost 78% of IT decision makers at more than 700 European companies either lacked understanding about the impact of …
Millions of smart devices in Spain are vulnerable to attack
Avast revealed the findings of its research experiment into smart devices, including public and private webcam vulnerabilities in Spain, and, specifically, in Barcelona. Avast …
500,000+ devices have dangerous apps installed
At Mobile World Congress (MWC) 2017, connected cars, the future of smart homes and, of course, the newest handsets are top of the agenda. Intel Security’s latest findings show …
Addressing pain points in governance, risk and compliance
In this day and age, it seems as though every business has some form of alphabet soup or acronym salad that shapes the decisions they make as it pertains to their information …
How IoT initiatives impact the IT infrastructure
Internet of Things (IoT) infrastructure spending is making inroads into enterprise IT budgets across a diverse set of industry verticals. Improved business offerings, IoT data …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage