Help Net Security

90% of consumers think security should be built into smart devices
90% of consumers polled from Brazil, China, Germany, India, UK and US believe it is important that a connected device has security built into the product, digital platform …

Win a security gap assessment from NTT Security at Black Hat
This year at Black Hat 2017, NTT Security is focusing on incident response readiness: one lucky show participant will win a thorough security gap assessment from the NTT …

Orchestrating security across multiple environments
In an effort to help organizations centralize their intelligence and security process management, ThreatConnect has expanded its security platform’s capabilities to …

Only 2% of “GDPR-ready” organizations are actually compliant
Only nine percent of UK organizations that believe they are prepared for the General Data Protection Regulation (GDPR) actually are, new research from Veritas has found. In …

Secrets of successful threat hunters and SOCs
McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution …

Expected cyber threats over the next six months
With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, …

CrowdStrike launches malware search engine
CrowdStrike launched CrowdStrike Falcon MalQuery, the first malware search and intelligence component of its CrowdStrike Falcon Search Engine for cybersecurity data. …

Qualys CloudView to deliver continuous security of public cloud infrastructure
Qualys announced CloudView, a new app framework in the Qualys Cloud Platform for comprehensive and continuous protection of cloud infrastructure, delivering InfoSec and …

6+ billion records exposed in data breaches in first half of 2017
There have been 2,227 publicly disclosed data compromise events since the beginning of the year through June 30th, according to Risk Based Security. While this is in keeping …

UK govt urges teenagers to apply for cyber security training programme
UK teenagers are being encouraged to register in a cyber security training programme rolled out to help the nation address the risk of a future skills shortage. The Department …

Custom code accounts for 93% of application vulnerabilities
Although third-party software libraries represent a majority of an application’s code, they account for less than seven percent of application vulnerabilities. Typically, …

Testing the security of connected cars and IoT devices
IBM Security announced the launch of two new security testing practice areas focused on automotive security and the Internet of Things (IoT). The new services will be …
Featured news
Resources
Don't miss
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”