Help Net Security
Week in review: The danger of terror attacks using drones, cheap web cams as permanent backdoors into networks
Here’s an overview of some of last week’s most interesting news and articles: Wi-Fi and security are better together for SMBs As a small to midsized business …
Success of the Internet of Things depends on privacy and security
Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …
Compromised credentials a leading concern for most security pros
90% of organizations are worried about compromised credentials, though 60% say they cannot catch these types of attacks today, according to a new survey by Rapid7. 62% of …
Key principles for corporate digital responsibility
Businesses’ use of personal data from consumers is at risk and recommends key strategies and principles to properly protect consumer data, build trust and simultaneously grow …
Why the legal sector is risking confidential information
The lack of unique logins, manual logoffs and concurrent logins is putting confidential information in the legal sector at risk, new research has revealed. A report by IS …
800 risk experts from 40 countries identify the top global business risks
The risk landscape for businesses is substantially changing in 2016. While businesses are less concerned about the impact of traditional industrial risks such as natural …
Shift in strategy around cloud adoption and security
Cloud adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place, according to a new CSA survey. …
Compliance compounded by evolving threat landscape
As industry business models change, compliance challenges are being compounded by an evolving threat landscape and by increased scrutiny from federal agencies looking to …
Cloud Identity and Access Management market to reach $2.8 billion by 2020
A new report by Allied Market Research projects that the global cloud IAM market would garner revenue of $2.8 billion by 2020, registering a CAGR of 26.2% during the forecast …
Attackers use SQL injection to manipulate search engine rankings
Akamai has identified a sophisticated SEO campaign that uses SQL injection to attack targeted websites. Affected websites will distribute hidden HTML links that confuse search …
Most companies do nothing to protect their mobile apps
There’s a wide disparity between consumer confidence in the level of security incorporated into mobile health and finance apps and the degree to which organizations …
Insider threat focus on the rise
The focus on insider threats will increase and corporations will begin to penalize employees who misinterpret security policies and procedures, according to a new survey of …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways