![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194301/architecture-400x200.jpg)
Coalition aims to educate policymakers on cybersecurity
A group of vendors launched the Coalition for Cybersecurity Policy and Law, a new organization that will focus on education and collaboration with policymakers on the …
![PacketFence](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194304/packetfence-400x200.jpg)
PacketFence: Free and open source network access control
PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …
![sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195225/sign-400x200.jpg)
Week in review: The new Help Net Security, critical Glibc flaw, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles: Welcome to the new Help Net Security We rolled out a brand new version of …
![market](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195228/market-400x200.jpg)
IRS warns of 400 percent surge in tax-related phishing emails
The number of tax related phishing and malware incidents has exploded this US tax season, the US Internal Revenue Service (IRS) has warned on Thursday. All in all, there has …
![Connect](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195252/connect-400x200.jpg)
DHS releases guidelines for CISA-sanctioned cybersecurity information sharing
The US Department of Homeland Security has published guidelines on how the private sector and federal entities can share cyber threat indicators (CTIs) with the US federal …
![Android Marshmallow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194956/android-marshmallow-400x200.jpg)
3-in-1 Android malware acts as ransomware, banking Trojan and infostealer
Why stop at asking ransom for encrypted files when you can also steal personal info, passwords, online banking credentials and credit card details, and then sell it or use it …
![money china](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194324/money-china-400x200.jpg)
IT spending to slow down in 2016
Worldwide IT spending is expected to post a major slowdown in 2016, as economic weakness in emerging markets and saturation of the smartphone market combine to result in a …
![ransomware livechat](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194326/ransomware-livechat-400x200.jpg)
Ransomware offers customer support via chat
PadCrypt, a newly discovered piece of ransomware, offers the victims the possibility to chat with the criminals behind the scheme. This ransomware, as many before it, presents …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194328/email-400x200.jpg)
Email security still an afterthought
Email continues to be a critical technology in business and the threat of email hacks and data breaches loom large over IT security managers. Consequently, confidence and …
![match fire](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195631/matchstick-20237_1920-400x200.jpg)
Application downtime costing enterprises $16 million each year
Despite numerous high-profile incidents in the last year, enterprises are still not paying enough attention to the needs of their users, according to Veeam. 84 percent of …
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194333/professional-400x200.jpg)
Why the C-suite should care about cybersecurity
Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them. IBM Security interviewed CxOs, from 28 …
![W3C](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194336/w3c-400x200.jpg)
W3C launches effort to replace passwords
The World Wide Web Consortium (W3C) is launching a new standards effort in web authentication that aims to offer a more secure and flexible alternative to password-based …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark