Help Net Security
How are businesses responding to cyber risks?
Year after year, cyberattacks continue to escalate in frequency, severity and impact. However, prevention, detection methods and cybersecurity innovation are on the rise as …
The impact of digital business on information security
Changes in computing fabric, devices and services formed by digital business continue to shape risk and security landscapes, according to Gartner. By year-end 2017, more than …
Wealth of personal data found on used electronics purchased online
Varying amounts and types of residual data have been found on used mobile devices, hard disk drives and solid state drives purchased online from Amazon, eBay and …
The price of the Internet of Things will be a vague dread of a malicious world
Volkswagen didn’t make a faulty car: they programmed it to cheat intelligently. The difference isn’t semantics, it’s game-theoretical (and it borders on applied demonology). …
How attackers attempt to infect organizations
A new report by Palo Alto Networks, based on data from more than 7,000 enterprises worldwide, showcases real-world trends in enterprise application usage and critical …
High prevalence of personal health information at risk
The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances …
Winnti group’s attack platform is based on decade old malware
“Kaspersky Lab experts tracking the activity of the Winnti group have discovered an active threat based on a 2006 bootkit installer. The threat, which they name HDRoot …
It’s not just about Big Data, it’s what you do with it
Worldwide IT spending is forecast to surpass $3.6 trillion in 2016, a 1.5 percent increase from 2015, according to Gartner, Inc. The IT industry is being driven by digital …
Applying machine learning techniques on contextual data for threat detection
The momentum behind cloud computing couldn’t be stronger as companies, governments and other organizations move to the cloud to lower costs and improve agility. However, you …
Attackers prefer lower-bandwidth DDoS attacks
Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade …
Cybersecurity is being taken seriously around the globe
There has been a dramatic increase in the attention that boards and executives are paying to cybersecurity risk management, according to a new global study developed by the …
Top 5 Android Marshmallow enterprise security benefits
Google’s new Android Marshmallow operating system offers important new security and ease-of-use features that improve its functionality for both enterprise and individual …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground