Help Net Security
Organizations are uncovering a cloud security paradox
The characteristics of modern applications in the cloud are changing, requiring software and IT architects to shift priorities. Businesses of all sizes are transforming in …
DOE invests $50 million to improve critical energy infrastructure security
Today, the Department of Energy (DOE) is announcing awards of up to $50 million to DOE’s National Laboratories to support early stage research and development of …
Using behavior analysis to solve API security problems
When people think about complex security challenges, airport security might be the most familiar. The scope of challenges and implications of breaches are daunting. This is …
European banks at mercy of US regulators
European banks are under disproportional enforcement pressure from US regulators. Since 2012, of the $38.4bn levied in economic crime fines worldwide, 97 percent of all fines …
Most infosec pros believe election hacks are acts of cyber war
IT security professionals believe the effects of cyber attacks on elections go beyond diminishing confidence in the democratic process, according to a Venafi survey of 296 IT …
Do IT modernization efforts increase security challenges?
Most government IT executives believe that IT modernization projects increase security challenges as opposed to alleviate them, according to a new study from Unisys. A large …
Insurers increasingly concerned about silent cyber exposure
Around half of industry practitioners see the risk of silent cyber exposure – potential cyber-related losses due to silent coverage from insurance policies not specifically …
Global DDoS mitigation market trends and developments
Frost & Sullivan found that the DDoS mitigation market generated a revenue of $816 million in 2016 and is expected to register a CAGR of 17.1 percent through 2021. Threat …
Week in review: Equifax breach, Instagram hack, Android Toast Overlay attack
Here’s an overview of some of last week’s most interesting news and articles: Patch your Android device to foil Toast Overlay attacks Overlay attacks are nothing …
13% of SMBs have experienced an IoT-based attack
One in four companies have already experienced a ransomware attack and one in eight have dealt with an IoT-based attack, according to Arctic Wolf Networks. As mid-market …
Insider threats and ransomware are most feared, followed by DDoS attacks
A new SANS survey found that ransomware, insider threats and denial of service are considered the top three threats organizations face when it comes to securing sensitive …
Key elements of a secure, sensitive information sharing strategy
It’s been said, data is like the new oil. What does this mean exactly? Like oil, data is a commodity. But unlike oil, the value of data isn’t susceptible to supply and demand. …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research