Help Net Security
Exposing the shadow data threat
Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …
How well protected is NHS data?
A new study carried out by Vanson Bourne reveals a gap between the perceived strength of IT security measures in the NHS and the actual level of IT security built into NHS …
Oracle fixes 248 vulnerabilities in January patch update
Oracle has published their Critical Patch Update (CPU) for January 2016. The Oracle CPU is quarterly and addresses the flaws in large Oracle’s product line, including their …
Industrialized attackers systematically destroy defender confidence
Only 45 percent of organizations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns, according to …
Rise of automation: Battle of the bots
As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …
Businesses fail to take full advantage of encryption technology
Private, highly-sensitive employee information, including banking details, HR files and personal healthcare records, is at risk. While many companies take the security of …
Cybersecurity recommendations for medical device manufacturers
Cybersecurity threats to medical devices are a growing concern. The exploitation of cybersecurity vulnerabilities presents a potential risk to the safety and effectiveness of …
Good practice guide on disclosing vulnerabilities
ENISA published a good practice guide on vulnerability disclosure, aiming to provide a picture of the challenges the security researchers, the vendors and other involved …
Endpoint security really can improve user experience
Traditional security policies are intrusive and impact user productivity. This is unfortunately the opinion of most end users. In fact, according to a recent study performed …
Unexpected implications arising from the Internet of Things
More than half of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by 2020, according to Gartner. The impact of the IoT …
Week in review: The danger of terror attacks using drones, cheap web cams as permanent backdoors into networks
Here’s an overview of some of last week’s most interesting news and articles: Wi-Fi and security are better together for SMBs As a small to midsized business …
Success of the Internet of Things depends on privacy and security
Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage