Help Net Security

Only two percent of IT experts consider third-party secure access a top priority
Soha Systems released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group, …

The 3 biggest cybersecurity risks posed in the 2016 presidential election
Here’s a question for you: What do the four recent cyber attacks from the hacker group Anonymous have in common? Attack 1: On March 4, 2016, a group inside of Anonymous …

Most organizations can’t protect digital information in the long-term
New research has revealed that the majority of organizations do not have a coherent long-term strategy for their vital digital information even though virtually all of them …

Security startup confessions: Limited funds and their impact on security
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Security spending rises in areas ineffective against multi-stage attacks
Vormetric announced the results of the Financial Services Edition of the 2016 Vormetric Data Threat Report (DTR). This edition extends earlier findings of the global report, …

Top 20 risk factors for retailers
According to BDO’s analysis of risk factors listed in the most recent 10-K filings of the 100 largest US retailers, risk associated with a possible security breach was …

Week in review: Docker security, SWIFT warns of new attacks, SAP vulnerability exploited
Here’s an overview of some of last week’s most interesting news and articles: SWIFT warns of new attacks, Bangladesh Bank heist linked to Sony hack They believe …

Milagro: A distributed cryptosystem for the cloud
A new open source project within the Apache Incubator aims to create an alternative to outdated and problematic monolithic trust hierarchies such as commercial certificate …

Do users’ perceptions of password security match reality?
Think your password is secure? You may need to think again. People’s perceptions of password strength may not always match reality, according to a recent study by CyLab, …

Bridging the security automation gap
Security management has gotten out of hand, according to our recent State of Automation in Security Report. 48% of survey respondents had an application outage as a result of …

Healthcare under attack! 89% of organizations experienced data breaches
It’s a turbulent time for the healthcare industry: patient data is under siege and hospitals are big targets for cyber attacks, according to the Ponemon Institute. Mistakes …
Worldwide server virtualization market is reaching its peak
The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, an increase of 5.7 percent from 2015, according to Gartner. Despite the overall …
Featured news
Resources
Don't miss
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”