Help Net Security
![corporate cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105250/corporate-cloud-400x200.jpg)
Companies struggle to deploy security for custom applications
As more and more companies migrate their application workloads from their datacenters to infrastructure-as-a-service (IaaS) platforms such as the Amazon Web Services (AWS) …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Russian-speaking cybercriminals created over 75% of all crypto ransomware
According to the Kaspersky Lab’s telemetry, in 2016 more than 1,445,000 users (including businesses) around the globe were attacked by 54 thousand modifications of 60+ …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Intel Security’s strategy for eliminating cybersecurity fragmentation
At RSA Conference 2017, Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation. The workforce shortage facing …
![qualys cloud agent platform](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113911/qualys-cloud-agent-platform-400x200.jpg)
Qualys Cloud Platform offers two new disruptive services
Qualys announced a major expansion of its Qualys Cloud Platform. New services include File Integrity Monitoring (FIM) and Indicators of Compromise (IOC) detection solutions …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
Targeted attack prevention in cloud email and messaging systems
GreatHorn announced the launch of the GreatHorn Threat Platform (GTP) at RSA Conference 2017. The Threat Platform extends the capabilities of the company’s cloud-native …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111052/people-400x200.jpg)
U.S. consumers’ views on cybersecurity
To better understand how Americans think about hacker motivations, consumer versus business security responsibilities, ransomware and the political climates impact on the …
![Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194424/hands-keyboard-400x200.jpg)
Cybersecurity training management and skills assessment platform
No cost and open source cybersecurity massive open online course (MOOC) provider Cybrary announced the launch of its Teams training management and skills assessment platform …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105628/IoT-400x200.jpg)
Security programs not keeping up with IoT threats
More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111706/users-400x200.jpg)
Qualys and Bugcrowd bring automation, crowdsourcing to web app security
At RSA Conference 2017, Qualys and Bugcrowd announced joint development integrations allowing joint customers the ability to share vulnerability data across automated web …
![Cybereason platform](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105050/cybereason-platform-400x200.jpg)
Cybereason unveils complete next-generation endpoint platform
Cybereason unveiled a new Endpoint Security Platform that includes next-generation antivirus (NGAV) functionality at RSA Conference 2017 in San Francisco. By integrating …
![Magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194145/magnify-400x200.jpg)
25% of web apps still vulnerable to eight of the OWASP Top Ten
69 percent of web applications are plagued by vulnerabilities that could lead to sensitive data exposure, and 55 percent by cross-site request forgery flaws, the results of a …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111125/data-400x200.jpeg)
Metadata: The secret data trail
Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage