Help Net Security
Evaluating the security of the top enterprise apps
Wandera announced the findings of a comprehensive security assessment of the most popular business apps used on corporate mobile devices by enterprise customers across North …
Playbook: Prepare your business for DDoS attacks
Like any business initiative, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as possible. …
Application security market will grow to $6.77 billion by 2021
According to a new market research report by MarketsandMarkets, the global application security market size is estimated to grow from USD 2.24 Billion in 2016 to USD 6.77 …
Liberty Reserve founder sentenced to 20 years for money laundering
Arthur Budovsky was sentenced in the Southern District of New York to 20 years imprisonment for running a massive money laundering enterprise through his company Liberty …
New ransomware modifications increase 14%
Kaspersky Lab detected 2,896 new ransomware modifications during the first quarter, which is an increase of 14 percent on the previous quarter. In addition, the number of …
How small businesses approach risk mitigation and response
CSID released the findings of a survey recently conducted for small businesses (under 10 employees) to determine sentiment and concerns from small business owners around cyber …
Week in review: ImageMagick 0day, and why you need a Security Evangelist
Here’s an overview of some of last week’s most interesting news, reviews and articles: Web servers and sites under attack via ImageMagick zero-day flaw The flaw …
Companies are hungry for professional open source talent
Recruiting open source talent is a top priority for hiring managers focused on recruiting technology talent, and recruiters are increasingly looking for more professional …
IoT and virtual reality: What’s next?
Smart doorbells, clever fridges, talking TVs, intelligent manufacturing, self-driving cars – all pretty cool. The IoT, in fact, is chock full of potentially very cool …
Build security design principles into cyber-physical systems
We are immersed in a cyber-physical world. Information technology is deeply embedded in traditionally non-IT systems, including automobiles, the electric grid and emergency …
Whitepaper: Protecting financial institutions from DDoS attacks
In response to the growing DDoS threat, the FFIEC issued a statement requiring banks and financial institutions to monitor their networks for DDoS attacks and proactively …
Consumers willing to share personal info for a reward
Nearly three in four people have security concerns about using beacon technology on their mobile devices. However, despite these concerns, six in ten will still share personal …
Featured news
Resources
Don't miss
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement