Help Net Security
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112340/lock-400x200.jpg)
Manage cybersecurity risk by restoring defense-in-depth’s promise
Cybersecurity spending continues to soar, as the current, $75.4 billion worldwide market will increase to $101 billion by 2018, according to projections from Gartner. But how …
![Users lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111610/users-lock-400x200.jpg)
What happens to consumer trust when a business is breached?
In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached. The …
![deep web](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194745/deep_web-400x200.jpg)
Cyber espionage group uses low profile tools to hunt high profile targets
Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and …
![London](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195027/london-400x200.jpg)
UK: Cybercrime now bigger threat than traditional crime
The accelerating pace of technology and criminal cyber capability currently outpaces the UK’s collective response to cybercrime, calling for stronger collaborative working …
![Abstract](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195656/twitter-research2-400x200.jpg)
Week in review: Mac malware boom, TP-LINK loses control of configuration domains
Here’s an overview of some of last week’s most interesting news, reviews and articles: TP-LINK loses control of two device configuration domains Security …
![Biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112119/biohazard-400x200.jpg)
Ransomware: Can we finally start learning from past mistakes?
There is a phrase I am finding quite relevant lately. It is attributed to the philosopher George Santayana and it goes like this: “Those who cannot remember the past are …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111637/ddos-400x200.jpg)
DDoS extortion campaigns increasingly target businesses
80 percent of European IT security professionals expect their business to be threatened with a DDoS ransom attack during the next 12 months, according to Corero Network …
![Bug](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195653/software-762486_1280-400x200.jpg)
Unsung cybersecurity vulnerabilities in US infrastructure and utilities
This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated “legacy systems” still in use …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111627/cloud-1-400x200.jpg)
Growth prospects of the cloud-based information governance market
The global cloud-based information governance market will grow at a CAGR of more than 27% through 2020, according to Technavio. Cloud-based information governance involves the …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194554/money-400x200.jpg)
Avast to acquire AVG for $1.3 billion
Avast Software and AVG Technologies have entered into a purchase agreement in which Avast will offer to purchase all of the outstanding ordinary shares of AVG for $25.00 per …
![District Attorney NYC](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111630/district_attorney_nyc-400x200.jpg)
StubHub fraud ringleader sentenced to state prison
Vadim Polyakov was sentenced to 4-to-12 years in state prison for coordinating an international cybercrime and money laundering scheme that involved the theft of personal …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112311/europe-400x200.jpg)
New rules aim to help EU member states tackle cyber attacks
Firms supplying essential services, e.g. for energy, transport, banking and health, or digital ones, such as search engines and cloud services, will have to improve their …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage