Help Net Security

Most businesses are considering or implementing IoT
The Internet of Things (IoT) is growing at an exponential rate. By 2020, some 50 billion devices will connect to the Internet and the economic value created by IoT could be …

Ecommerce fraud surges 163%
The worst fears of online retailers has been confirmed with data just released today: in 2015, the number of attacks by fraudsters was up 163 percent – growing two and a half …

Deep and Dark Web: Complexity and escalating cybercriminal activity
Flashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cybercrime over the past year. …

Coalition aims to educate policymakers on cybersecurity
A group of vendors launched the Coalition for Cybersecurity Policy and Law, a new organization that will focus on education and collaboration with policymakers on the …

Week in review: The new Help Net Security, critical Glibc flaw, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles: Welcome to the new Help Net Security We rolled out a brand new version of …

IT spending to slow down in 2016
Worldwide IT spending is expected to post a major slowdown in 2016, as economic weakness in emerging markets and saturation of the smartphone market combine to result in a …

Email security still an afterthought
Email continues to be a critical technology in business and the threat of email hacks and data breaches loom large over IT security managers. Consequently, confidence and …

Application downtime costing enterprises $16 million each year
Despite numerous high-profile incidents in the last year, enterprises are still not paying enough attention to the needs of their users, according to Veeam. 84 percent of …

Why the C-suite should care about cybersecurity
Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them. IBM Security interviewed CxOs, from 28 …

Fighting malware monetization and application vulnerabilities
As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data – without …

Why a single point of failure should be your primary concern
Many organizations are transitioning to digital systems, which has increased the dependency on cloud service providers, web hosting platforms, and other external services. …

DB Networks launches Layer 7 Database Sensor
DB Networks introduced a product that provides OEM partners with real-time deep protocol analysis of database traffic. By integrating this technology into their products, …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade