Help Net Security

Submissions are open for RSA Conference Innovation Sandbox Contest 2017
The 12th annual Innovation Sandbox Contest at RSA Conference is now accepting submissions to name the “RSAC Most Innovative Startup 2017.” Past winners include successful …

Week in review: Actively exploited Windows 0-day, ICS and IoT security
Here’s an overview of some of last week’s most interesting news, podcasts and articles: 65% of Windows devices still running Windows 7, released in 2009 To analyze …

Security startup confessions: Looking for investors
My name is Kai Roer and I am a co-founder of European security startup CTLRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

NICE framework: Resource for a strong cybersecurity workforce
The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) released a resource that will help U.S. employers more effectively identify, recruit, …

Distil Networks releases Hi-Def fingerprinting solution
Distil Networks announced the bot mitigation industry’s first Hi-Def fingerprinting solution. Hi-Def device fingerprinting goes beyond IP- and header-centric identification by …

Seven myths for hyperconverged integrated systems
As with many new technology trends, certain assumptions and hype emerge that can influence buyer behavior and lead to poor decisions. Gartner has identified seven of the most …

Cognitive systems and artificial intelligence revenues to reach $47 billion in 2020
Widespread adoption of cognitive systems and artificial intelligence (AI) across a broad range of industries will drive worldwide revenues from nearly $8 billion in 2016 to …

Post-pumpkin Patch Tuesday: What’s in store for November
There has been a lot of activity since October’s Patch Tuesday. During that short period of time, Oracle released its quarterly CPU, including an update for Java JRE; Adobe …

Overconfidence is putting organizations at higher risk for attacks
In the past twelve months, roughly one in three targeted attacks resulted in an actual security breach, which equates to two to three effective attacks per month for the …

Most activity on the dark web is legal and mundane
Terbium Labs has conducted a data-driven, fact-based research report that looked to identify what’s really taking place on the far corners of the Internet. Total …

When smartphone upgrades go wrong
As the holiday shopping season kicks into full gear around the world, industry analysts predict low prices, discounts and promotions will entice shoppers to buy the latest …

Merchants and financial institutions deal with escalating cyber attacks
Unsurprisingly, the Q3 2016 ThreatMetrix report shows a sharp increase in the number and complexity of cyber attacks. During what is traditionally a slow quarter, researchers …