Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Most organizations value threat intelligence sharing

94% of respondents to an Enterprise Strategy Group (ESG) study believe it is highly or somewhat valuable to share threat intelligence information between federal agencies and …

Companies stay vulnerable to web attacks for far too long

While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to …

The rise in false fraud alerts

68% of Americans who have received a fraudulent activity alert from their credit or debit card issuer have received at least one alert in error, according to …

DDoS attacks double, old web application attack vectors still active

Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.A surge in DDoS attack …

Can you afford to wait 197 days to detect a threat?

Financial services and retail organizations agree, advanced threats are the most serious security challenge facing their organizations, shows a new Ponemon Institute study. …

The cybersecurity domino effect

RedSeal unveiled its survey of high-ranking executives that illustrates widespread concern regarding the potential effects of cyberattacks in corporate America.Most of the …

New domains revive old spam

The new generic top-level domain (gTLD) registration program, launched in January 2014 and intended for use by relevant communities and organizations, has proved irresistible …

Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …

entrepreneur
Do ethics get in the way of security professionals?

While it’s convenient to think that the information security industry is made up of highly ethical individuals who make the right decision every time, a stressful …

Data breaches lead to surge of spoofing attacks

The number of attacks on businesses is trending up as crimeware tools gain traction providing tools to fraudsters to automate cybercrime attacks leveraging the customer data …

Can you correctly identify phishing emails?

An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …

CIOs are distracted by the business of keeping the lights on

75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools