Help Net Security
Defending the smart grid: What security measures to implement
Smart grids are a fundamental component of the European critical infrastructure. They are rooted on communication networks that have become essential elements allowing the …
Week in review: The death of Java plugin, Magento fixes e-store hijacking flaw, cybercriminals targeting healthcare data
Here’s an overview of some of last week’s most interesting news and articles: There’s no turning back: Say goodbye to the perimeter If you’ve been following …
The history of cyber attacks: From ancient to modern
In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …
Compromised enterprise networks fuel 236 percent increase in viruses and worms
Solutionary performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) …
Consumers are increasingly concerned about privacy and they’re acting on it
More Americans are concerned about not knowing how the personal information collected about them online is used than losing their principal source of income. A new study by …
Innovation Sandbox Contest 2016 finalists announced
RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …
Why cybercriminals target healthcare data
In 2015, one in three Americans were victims of healthcare data breaches, attributed to a series of large-scale attacks that each affected more than 10 million individuals. …
Most large organizations will have a Chief Data Officer by 2019
The race to drive competitive advantage and improved efficiency through better use of information assets is leading to a sharp rise in the number of chief data officers …
Larger, more complex, financially motivated DDoS attacks on the rise
DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, the results of Arbor Networks’ …
1 in 3 home routers will be used as public Wi-Fi hotspots by 2017
Juniper Research predicts that at least 1 in 3 home routers will be used as public Wi-Fi hotspots by 2017, and that the total installed base of such dual-use routers will …
Data protection and breach readiness guide
The Online Trust Alliance (OTA) released its 2016 Data Protection and Breach Readiness Guide, which provides prescriptive advice to help businesses optimize online privacy and …
Europe’s cyber security accelerator program helps entrepreneurs
A new program to support cyber security startups will help develop innovative technical solutions. Start ups who want to offer cyber security solutions will be able to get …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage