Help Net Security

Former Expedia IT support worker spied on company executives
A computer support technician formerly employed at Expedia offices in San Francisco pleaded guilty to securities fraud. Jonathan Ly, 28, admitted he used his position in tech …

Top 6 breach response best practices for 2017
Cybercrime costs are expected to rise to $2 trillion by 2018, according to Juniper Research, in large part because the increase in cyber threats is resulting in a surge in …

Remote access options for unidirectionally protected networks
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about remote access options for …

Security startup confessions: Customer breach disclosure
My name is Kai Roer and I am a co-founder of European security startup CLTRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

BYOD: How to provide secure access to network resources
IT organizations have little or no choice when it comes to Bring Your Own Device (BYOD) programs. Employees want to access the network with their personally owned devices, and …

The global decline of cybersecurity confidence
Tenable Network Security solicited insights from 700 security practitioners in nine countries and across seven industry verticals to calculate a global index score reflecting …

Intentional or not, insider threats are real
Despite the perception that hackers are a company’s biggest cybersecurity threat, insiders, including careless or naive employees, are now viewed as an equally important …

Most email authentication implementations fail
Most of the world’s largest businesses fail at attempts to use open industry standards to control which email is sent using their names. Three quarters of large …

50% of businesses not leveraging public cloud
While more than 50 percent of respondents are not currently leveraging public cloud, 80 percent plan on migrating more within the next year, according to TriCore Solutions. As …

Week in review: Sextortion, Firefox 0-day, and next level red teaming
Here’s an overview of some of last week’s most interesting news, podcasts and articles: McAfee Labs predicts 14 security developments for 2017 Ransomware attacks …

65% of social engineering attacks compromised employee credentials
Social engineering is having a notable impact on organizations across a range of industrial sectors in the US. In fact, 60 percent of surveyed security leaders say their …

Massive cybercrime infrastructure demolished
After more than four years of investigation, the Public Prosecutor’s Office Verden and the Lüneburg Police in cooperation with the US Attorney’s Office for the Western …
Featured news
Resources
Don't miss
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help
- 3 DevOps security pitfalls and how to stay ahead of them
- CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073)
- Official Xubuntu website compromised to serve malware