Help Net Security
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113125/microsoft-400x200.jpg)
Microsoft patches Badlock, but doesn’t call it critical
Microsoft just released several security bulletins, with six marked as critical and seven categorized as important. The biggest surprise (or disguise) came in the patch marked …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113150/lock-symantec-400x200.png)
Cybercriminals are adopting corporate best practices
Cybercriminals are adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and …
![cloud computing](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113632/cloud_computing-400x200.png)
Attacks are driving cloud security market growth
The global cloud security market is expected to grow at a CAGR of over 20% until 2019, according to Technavio. “A key reason for the adoption of cloud security is the sudden …
![The Release](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113154/release-movie-privacy-400x200.jpg)
Documentaries about an expert convicted of leaking classified information
Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113202/lights-400x200.jpg)
Developing the perfect exfiltration technique
At SafeBreach, one of our major research areas is exfiltration (sending sensitive data out of the corporate network). In one of our research projects in late 2015, we set out …
![skull binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113205/skull-api-400x200.jpg)
The inconvenient truth about API security
Ovum Consulting asked IT and security professionals across a variety of industries globally about their use of APIs, adoption of API management platforms, and the security …
![Bomgar survey](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113208/bomgar-survey-400x200.jpg)
Are your vendors leaving you vulnerable?
Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the …
![general virtual digital](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113219/general-virtual-400x200.jpg)
Week in review: Panama Papers, dark web mapping, WhatsApp end-to-end encryption
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Panama Papers breach was the result of lax security practices? News items …
![energy](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113228/energy-400x200.jpg)
Surge in cyber attacks on the energy sector
A new survey conducted by Dimensional Research, which was carried out in November 2015, assessed cyber security challenges faced by organizations in the energy sector. Study …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113231/iot-survey-400x200.jpg)
Consumer concerns of a connected world
While consumers see the tangible benefit of IoT (just 1 consumer in 10 says a world of connected devices won’t deliver such value), more than half also harbour concerns …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
Lack of backup tech hinders next-generation database adoption
While there is immediate and increasing interest in evolving infrastructure to support distributed, scale-out databases and cloud databases, a lack of robust backup and …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113236/money-400x200.jpg)
Worldwide IT spending to decline this year
Worldwide IT spending is forecast to total $3.49 trillion in 2016, a decline of 0.5 percent over 2015 spending of $3.5 trillion, according to Gartner. This is down from last …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage