Help Net Security
Combatting human error in cybersecurity
Mistakes are part of life, but unfortunately in cybersecurity operations, mistakes have the potential to be financially devastating to the business. According to a 2014 IBM …
Risky mobile behaviors are prevalent in the government
Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies …
Top 3 biggest mistakes enterprises make in application security
Enterprise information security encompasses a broad set of disciplines and technologies, but at the highest level it can be broken down into three main categories: network …
If you build it, they will come
If you build it, they will come. But will you be ready? Will any of us? It’s almost impossible to escape the topic of the Internet of Things (IoT). Whatever the technology …
Cybercriminals are becoming more creative
The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminals became more inventive in their attack methods to infiltrate and abuse …
The rise of mobile transactions and online lending fraud
During Q2, ThreatMetrix examined cybercrime attacks detected during real-time analysis and interdiction of fraudulent online payments, logins and new account registrations. …
Evaluating the security of open source software
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation, is developing a new free Badge Program, seeking input from the open source community on …
The rise of artificial intelligence technologies
The advance of artificial intelligence (AI) technologies has caught the attention of companies and institutions in a wide range of enterprise markets, and executives in almost …
Most security executives lack confidence in their security posture
A new Raytheon|Websense survey of security executives at large companies in the U.S. reveals that confidence in their enterprise security posture is lacking.According to the …
The insider versus the outsider: Who poses the biggest security risk?
Today, many organizations are under continuous attack from nation-states or professional cyber criminals. One of the main focuses for IT security teams is stopping intruders …
The unstoppable rise of DDoS attacks
For the past three quarters, there has been a doubling in the number of DDoS attacks year over year, according to Akamai. And while attackers favored less powerful but longer …
Keep your site more secure with WordPress 4.3
WordPress 4.3, named Billie in honor of jazz singer Billie Holiday, is available for download or update in your WordPress dashboard.The new version enables you to keep your …
Featured news
Resources
Don't miss
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals