Help Net Security
The multiple benefits of IT auditing
Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on …
Amazon Cloud Drive now with unlimited cloud storage
Amazon announced unlimited cloud storage with Amazon Cloud Drive—two new storage plans for customers to securely store their existing content collections and automatically …
How companies secure their cloud data
As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud …
Behavioral biometrics: The password you can’t forget
This year’s Mobile World Congress featured more biometrics technology than ever before, with the launch of Google’s Android Pay and Samsung Pay both unveiling …
Data lurking: How to protect your company against overlooked insider threats
Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come …
15,435 vulnerabilities across 3,870 applications were recorded in 2014
In 2014, 15,435 vulnerabilities were discovered according to data from Secunia Research. The vulnerabilities are spread across 3,870 applications published by 500 different …
Implementing an effective risk management framework
In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new …
Mobile apps are not being tested for insecure behavior
Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …
One in three top Alexa websites is risky
Based on an analysis of the Alexa top one million sites, Menlo Security found that more than one in three of the top domains are either already compromised or running …
Organizations have little control over privileged access
Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated …

Finalists announced for Innovation Sandbox at RSA Conference 2015
RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …
The average DDoS attack tripled in volume
The average packet volume for DDoS attacks increased 340 percent to 4.36 million packets per second (Mpps), and the average bit volume swelled 245 percent to 12.1 Gbps in the …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption