Help Net Security
![Users lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111610/users-lock-400x200.jpg)
The current state of privileged access management practices
There’s a widening gulf between organizations that adhere to best practices for privileged access management, according to BeyondTrust. Password and credential …
![Pokémon GO](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110853/pokemon-target-400x200.jpg)
Essential Pokémon GO protection tips
Since its release, Pokémon GO has become the most downloaded game in history on iOS and Android. However, Gemalto is now warning its millions of players around the world to …
![stats](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110855/stats-400x200.jpg)
Global mobile deep packet inspection market explodes
The global mobile deep packet inspection (DPI) market will grow at an impressive CAGR of almost 22% until 2020, according to Technavio. Stateful packet inspection Stateful …
![Armor](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111245/armor-400x200.jpg)
Armor helps streamline HITRUST certification
As the healthcare industry continues to be a major cybercrime target, compliance has gained even more significance. HITRUST certification has emerged as the benchmark for …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110910/biohazard-400x200.jpg)
The evolution of BEC scams and ransomware
Trend Micro analyzed the trends in attacks and vulnerabilities seen throughout the first half of this year, and found a rise and impact of attacks, such as a 172 percent …
![KPMG security](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110918/kpmg-security-400x200.jpg)
Consumers ready to walk away from their favorite retailers if a breach occurs
Consumers are wary of the increased frequency of cyber attacks against retailers, and many are ready to walk away from their favorite retailers if a breach occurs. In fact, in …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110925/europe-400x200.jpg)
Cyber attacks: Hindsight is 20/20, GDPR is even better
The dust is beginning to settle on the EU referendum result. But, while the UK’s departure from the union is set to shake things up for many businesses nationwide, there’s at …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110913/chip-400x200.jpg)
Researchers design a chip that checks for sabotage
With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious …
![antenna](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110915/antenna-400x200.jpg)
Cybercriminals select insiders to attack telecom providers
Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
Privileged user abuse and the insider threat
Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …
![linux tux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195038/linux-tux-400x200.jpg)
Linux kernel development: How fast it’s going and who is doing it
The Linux Foundation analyzed the work done by over 13,500 developers over more than a decade, to provide insight into the Linux kernel development trends and methodologies …
![World target](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110934/world-target-400x200.jpg)
Shadow Brokers, digital attacks, and the escalation of geopolitical conflict
Last week’s data dump by the Shadow Brokers has left many wondering how the US will respond. This is just the latest in a series of politically motivated data breaches often …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage