cybersecurity
![Patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101437/patch-400x200.jpg)
How to close the security update gap
Security patching is hard and patch fatigue is real. So what can be done to make the process more simple, less disruptive, and more likely to be performed in a timely manner? …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195645/Bitcoin-400x200.jpg)
Using biometrics to protect crypto currency
The rise of crypto currency is something that investors have monitored closely. Whether Bitcoin, Zcash or Ripple, the rise of this digital currency is here to stay. With this …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102115/earth-400x200.jpg)
Are legacy technologies a threat to EU’s telecom infrastructure?
Telecommunications is a key infrastructure based on how our society works. It constitutes the main instrument that allows our democracy and our EU core values such as freedom, …
![doctor](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111351/doctor-400x200.jpg)
Most healthcare pros believe their organizations adequately protect patient data
Most of the healthcare professionals polled remain confident regarding their own organization’s cyber security protocols despite apprehensions connected with their own …
![success](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113141/success-400x200.jpg)
Secure software development practices for developers, organizations and technology users
SAFECode announced today the publication of the Fundamental Practices for Secure Software Development: Essential Elements of a Secure Development Life Cycle Program (Third …
![SF](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104041/sf-400x200.jpg)
Nation-state hackers are attacking our trust in critical systems
In the last few years, the lines between cyber criminals and nation-states have become increasingly blurry and it has become obvious that the private sector is not capable of …
![crowd](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101452/crowd-400x200.jpg)
Are there too many cybersecurity companies?
The most potent global threat in 2018 may not be armed conflict or civil unrest, but cybersecurity. While cybersecurity awareness has increased with high profile breaches in …
![crypto currency](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101455/crypto_currency2-400x200.jpg)
Crypto mining runs rampant in higher education: Is it students?
The higher education sector exhibited a startling increase in potentially damaging cryptocurrency mining behaviors, according to Vectra. The Attacker Behavior Industry Report …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101457/biohazard-400x200.jpg)
Macro-less word document attacks on the rise
WatchGuard released its Internet Security Report for Q4 2017. Among the report’s most notable findings, threat intelligence showed that total malware attacks are up by …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110808/usb-400x200.jpg)
The current state of USB data protection
Data protection, whether related to personal customer or patient information, is critical across virtually all industries. So how can organizations best protect their most …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101500/money-1-400x200.jpg)
Worldwide spending on security solutions to reach $91 billion in 2018
Worldwide spending on security-related hardware, software, and services is forecast to reach $91.4 billion in 2018, an increase of 10.2% over the amount spent in 2017. This …
![mobile user](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101502/mobile_user-400x200.jpg)
Businesses suspect their mobile workers are being hacked
More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?